Vulnerabilites related to siemens - simatic_wincc_runtime_professional
Vulnerability from fkie_nvd
Published
2019-05-14 20:29
Modified
2024-11-21 04:20
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "78F045C4-8DC2-4FA8-833D-B430EA26F2A0",
                     versionEndIncluding: "8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "858628AC-EA69-4D72-AE23-77A4A8DE2547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A75F15-8F47-4348-A85C-D94BBA8F9992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F27A96F-58B7-492F-8CF7-DE04D4EDAAD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B89914-E5BA-4670-B692-092AE9FFE148",
                     versionEndIncluding: "7.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D6229A2-9B8E-4F76-8425-589D2CE58B16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64B795A-7E66-49AE-BE40-E8EEAC12D280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D3A0BA7-EDC9-428D-A9C9-1CF602CEDFB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3D1A823-CE50-441F-B060-DA678DFE24FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28A1BA01-7A92-4368-8A73-8FA47A08BC53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0256663E-3A97-4E99-995D-7446804DB496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E07DBA91-379C-40F5-8C45-6EC302F5CA7D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en SIMATIC PCS 7 V8.0 y anteriores (Todas las versiones), SIMATIC PCS 7 V8.1 (Todas las versiones anteriores a la versión V8.1 con WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (Todas las versiones anteriores a la versión V8.2 SP1 con WinCC V7.4 SP1 Upd 11), SIMATIC PCS 7 V9.0 (Todas las versiones anteriores a la versión V9.0 SP2 con WinCC V7.4 SP1 Upd11), SIMATIC WinCC Professional (TIA Portal V13) (Todas las versiones) , SIMATIC WinCC Professional (TIA Portal V14) (Todas las versiones anteriores a la versión V14 SP1 Upd 9), SIMATIC WinCC Professional (TIA Portal V15) (Todas las versiones anteriores a la versión V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (Todas las versiones), SIMATIC WinCC Runtime Professional V14 (Todas las versiones anteriores a la versión V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (Todas las versiones anteriores a la versión V15.1 Upd 3), SIMATIC WinCC V7.2 y anteriores (Todas las versiones), SIMATIC WinCC V7.3 (Todas las versiones anteriores a la versión V7.3 Upd 19), SIMATIC WinCC V7.4 (Todas las versiones anteriores a la versión V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (Todas las versiones anteriores a la versión V7.5 Upd 3). La aplicación web SIMATIC WinCC DataMonitor de los productos afectados permite cargar código ASPX arbitrario. La vulnerbilidad de seguridad podría ser explotada por un atacante autenticado con acceso de red a la aplicación WinCC DataMonitor. No se requiere interacción del usuario para explotar esta vulnerabilidad. La vulnerabilidad afecta la confidencialidad, integridad y disponibilidad del dispositivo afectado. En la etapa de publicación de este aviso de seguridad no se conoce explotación pública.",
      },
   ],
   id: "CVE-2019-10918",
   lastModified: "2024-11-21T04:20:08.927",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-14T20:29:02.483",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-749",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2016-07-22 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "640FFC01-A0B7-466F-AE23-4BAEAADA4D7C",
                     versionEndIncluding: "7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "441E574D-1A66-4D8B-A0C5-4CC03E1D89D1",
                     versionEndIncluding: "7.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA2E9785-246F-496B-9139-02E2F4003352",
                     versionEndIncluding: "7.4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "9B434F8E-7E14-4D76-AC55-A15EF8EC10FB",
                     versionEndIncluding: "8.1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E38B1737-F40A-4278-8687-6928AE03B0C0",
                     versionEndIncluding: "8.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "9B434F8E-7E14-4D76-AC55-A15EF8EC10FB",
                     versionEndIncluding: "8.1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A18AA81-7FC3-4977-AFC9-77920845C8B8",
                     versionEndIncluding: "8.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B62697B-2F75-44EA-A1F8-14BF9D1F99CC",
                     versionEndIncluding: "8.2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "7F133189-C3AB-4FFD-9B5C-F181CFE50671",
                     versionEndIncluding: "13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.",
      },
      {
         lang: "es",
         value: "Siemens SIMATIC WinCC en versiones anteriores a 7.3 Update 10 y 7.4 en versiones anteriores a Update 1, SIMATIC BATCH en versiones anteriores a 8.1 SP1 Update 9 según se distribuye en SIMATIC PCS 7 hasta la versión 8.1 SP1, SIMATIC OpenPCS 7 en versiones anteriores a 8.1 Update 3 según se distribuye en SIMATIC PCS 7 hasta la versión 8.1 SP1, SIMATIC OpenPCS 7 en versiones anteriores a 8.2 Update 1 según se distribuye en SIMATIC PCS 7 8.2 y SIMATIC WinCC Runtime Professional en versiones anteriores a 13 SP1 Update 9 permite a atacantes remotos ejecutar código arbitrario a través de paquetes manipulados.",
      },
   ],
   id: "CVE-2016-5743",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2016-07-22T15:59:00.147",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/92112",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1036441",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
      },
      {
         source: "cve@mitre.org",
         url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/92112",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1036441",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-14 20:29
Modified
2024-11-21 04:20
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with access to the project file could run arbitrary system commands with the privileges of the local database server. The vulnerability could be exploited by an attacker with access to the project file. The vulnerability does impact the confidentiality, integrity, and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "78F045C4-8DC2-4FA8-833D-B430EA26F2A0",
                     versionEndIncluding: "8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "858628AC-EA69-4D72-AE23-77A4A8DE2547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A75F15-8F47-4348-A85C-D94BBA8F9992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F27A96F-58B7-492F-8CF7-DE04D4EDAAD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B89914-E5BA-4670-B692-092AE9FFE148",
                     versionEndIncluding: "7.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D6229A2-9B8E-4F76-8425-589D2CE58B16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64B795A-7E66-49AE-BE40-E8EEAC12D280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D3A0BA7-EDC9-428D-A9C9-1CF602CEDFB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3D1A823-CE50-441F-B060-DA678DFE24FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28A1BA01-7A92-4368-8A73-8FA47A08BC53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0256663E-3A97-4E99-995D-7446804DB496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E07DBA91-379C-40F5-8C45-6EC302F5CA7D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with access to the project file could run arbitrary system commands with the privileges of the local database server. The vulnerability could be exploited by an attacker with access to the project file. The vulnerability does impact the confidentiality, integrity, and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en SIMATIC PCS 7 V8.0 y versiones anteriores (Todas las versiones), SIMATIC PCS 7 V8.1 (Todas las versiones anteriores a la versión V8.1 con WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (Todas las versiones anteriores a la versión V8.2 SP1 con WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (Todas las versiones anteriores a la versión V9.0 SP2 con WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (Todas las versiones), SIMATIC WinCC (TIA Portal) V14 (Todas las versiones anteriores a la versión V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (Todas las versiones anteriores a la versión V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (Todas las versiones), SIMATIC WinCC Runtime Professional V14 ( Todas las versiones anteriores a la versión V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (Todas las versiones anteriores a la versión V15.1 Upd 3), SIMATIC WinCC V7.2 y anteriores (Todas las versiones), SIMATIC WinCC V7.3 (Todas las versiones anterior a la versión V7.3 Upd 19), SIMATIC WinCC V7.4 (Todas las versiones anteriores a la versión V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (Todas las versiones anteriores a la versión V7.5 Upd 3). Un atacante con acceso al archivo del proyecto podría ejecutar comandos arbitrarios del sistema con los privilegios del servidor de base de datos local. La vulnerabilidad podría ser explotada por un atacante con acceso al archivo del proyecto. La vulnerabilidad sí afecta la confidencialidad, integridad y disponibilidad del sistema afectado. En el momento de la publicación del aviso, no se conocía la explotación pública de esta vulnerabilidad de seguridad.",
      },
   ],
   id: "CVE-2019-10916",
   lastModified: "2024-11-21T04:20:08.653",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-14T20:29:02.293",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-13 09:15
Modified
2024-11-21 08:31
Summary
A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain malformed RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1350C78-30BE-4FA0-BE95-7A897C0D1927",
                     versionEndIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA5C1EC7-2F78-400D-9F85-FCEF71C4F1D5",
                     versionEndIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDA0756E-97B0-4896-BED4-44E86D6C76DE",
                     versionEndIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_route_control:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0AF2A6B-2A46-4147-AB1C-6E4DD71CD8C2",
                     versionEndIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64B795A-7E66-49AE-BE40-E8EEAC12D280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D3A0BA7-EDC9-428D-A9C9-1CF602CEDFB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E57C7724-EEDA-4F6E-8634-65B10C3319A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "872A881A-22F6-47E0-99ED-A83D9F77DB02",
                     versionEndIncluding: "18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:19:*:*:*:*:*:*:*",
                     matchCriteriaId: "18D1C8AC-6A32-4ABB-A52D-58B774A5C9BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain malformed RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en: \nOpenPCS 7 V9.1 (todas las versiones), \nSIMATIC BATCH V9.1 (todas las versiones), \nSIMATIC PCS 7 V9.1 (todas las versiones), \nSIMATIC Route Control V9.1 (todas las versiones), \nSIMATIC WinCC Runtime Professional V18 (todas las versiones), \nSIMATIC WinCC Runtime Professional V19 (todas las versiones), \nSIMATIC WinCC V7.4 (todas las versiones), \nSIMATIC WinCC V7.5 (todas las versiones &lt; V7.5 SP2 Update 15), \nSIMATIC WinCC V8.0 (Todas las versiones ",
      },
   ],
   id: "CVE-2023-48364",
   lastModified: "2024-11-21T08:31:34.503",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "productcert@siemens.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV40: [
         {
            cvssData: {
               Automatable: "NOT_DEFINED",
               Recovery: "NOT_DEFINED",
               Safety: "NOT_DEFINED",
               attackComplexity: "LOW",
               attackRequirements: "NONE",
               attackVector: "ADJACENT",
               availabilityRequirement: "NOT_DEFINED",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityRequirement: "NOT_DEFINED",
               exploitMaturity: "NOT_DEFINED",
               integrityRequirement: "NOT_DEFINED",
               modifiedAttackComplexity: "NOT_DEFINED",
               modifiedAttackRequirements: "NOT_DEFINED",
               modifiedAttackVector: "NOT_DEFINED",
               modifiedPrivilegesRequired: "NOT_DEFINED",
               modifiedSubAvailabilityImpact: "NOT_DEFINED",
               modifiedSubConfidentialityImpact: "NOT_DEFINED",
               modifiedSubIntegrityImpact: "NOT_DEFINED",
               modifiedUserInteraction: "NOT_DEFINED",
               modifiedVulnAvailabilityImpact: "NOT_DEFINED",
               modifiedVulnConfidentialityImpact: "NOT_DEFINED",
               modifiedVulnIntegrityImpact: "NOT_DEFINED",
               privilegesRequired: "NONE",
               providerUrgency: "NOT_DEFINED",
               subAvailabilityImpact: "NONE",
               subConfidentialityImpact: "NONE",
               subIntegrityImpact: "NONE",
               userInteraction: "NONE",
               valueDensity: "NOT_DEFINED",
               vectorString: "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
               version: "4.0",
               vulnAvailabilityImpact: "HIGH",
               vulnConfidentialityImpact: "NONE",
               vulnIntegrityImpact: "NONE",
               vulnerabilityResponseEffort: "NOT_DEFINED",
            },
            source: "productcert@siemens.com",
            type: "Secondary",
         },
      ],
   },
   published: "2024-02-13T09:15:45.980",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/html/ssa-753746.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/html/ssa-753746.html",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "productcert@siemens.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-14 20:29
Modified
2024-11-21 04:20
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with local access to the project file could cause a Denial-of-Service condition on the affected product while the project file is loaded. Successful exploitation requires access to the project file. An attacker could use the vulnerability to compromise availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "78F045C4-8DC2-4FA8-833D-B430EA26F2A0",
                     versionEndIncluding: "8.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "858628AC-EA69-4D72-AE23-77A4A8DE2547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A75F15-8F47-4348-A85C-D94BBA8F9992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F27A96F-58B7-492F-8CF7-DE04D4EDAAD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B89914-E5BA-4670-B692-092AE9FFE148",
                     versionEndIncluding: "7.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D6229A2-9B8E-4F76-8425-589D2CE58B16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64B795A-7E66-49AE-BE40-E8EEAC12D280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D3A0BA7-EDC9-428D-A9C9-1CF602CEDFB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3D1A823-CE50-441F-B060-DA678DFE24FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "28A1BA01-7A92-4368-8A73-8FA47A08BC53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0256663E-3A97-4E99-995D-7446804DB496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E07DBA91-379C-40F5-8C45-6EC302F5CA7D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with local access to the project file could cause a Denial-of-Service condition on the affected product while the project file is loaded. Successful exploitation requires access to the project file. An attacker could use the vulnerability to compromise availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en SIMATIC PCS 7 V8.0 y anteriores (Todas las versiones), SIMATIC PCS 7 V8.1 (Todas las versiones anteriores a la versión V8.1 con WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (Todas las versiones anteriores V8.2 SP1 con WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (Todas las versiones  anteriores a la versión V9.0 SP2 con WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (Todas las versiones), SIMATIC WinCC (TIA Portal) V14 (Todas las versiones ",
      },
   ],
   id: "CVE-2019-10917",
   lastModified: "2024-11-21T04:20:08.790",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-14T20:29:02.387",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-248",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-755",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-10 17:15
Modified
2024-11-21 05:37
Summary
A vulnerability has been identified in SIMATIC Automation Tool (All versions < V4 SP2), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions < V17), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC STEP 7 V5 (All versions < V5.6 SP2 HF3), SIMATIC WinCC OA V3.16 (All versions < V3.16 P018), SIMATIC WinCC OA V3.17 (All versions < V3.17 P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions < V1.0 SP2), SINEMA Server (All versions < V14 SP3), SINUMERIK ONE virtual (All Versions < V6.14), SINUMERIK Operate (All Versions < V6.14). A common component used by the affected applications regularly calls a helper binary with SYSTEM privileges while the call path is not quoted. This could allow a local attacker to execute arbitrary code with SYTEM privileges.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_automatic_tool:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A659B687-1038-42F5-B8AC-A394E41D22A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_net_pc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "744B5953-511F-42CA-80A0-DBE36A6AA144",
                     versionEndExcluding: "16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_net_pc:16:-:*:*:*:*:*:*",
                     matchCriteriaId: "496E3C43-5DA8-4983-8AC6-0F32454E22F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_net_pc:16:update1:*:*:*:*:*:*",
                     matchCriteriaId: "17BCC3CD-61D0-416D-A241-D35AF8EE5BF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13E3BDF0-B691-4A97-A74A-A65EC910480E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D61D4B81-7F51-49BE-83DD-D2C28D23B0EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_prosave:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB7752CF-D754-4A78-999B-45FE379E03DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_s7-1500_software_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "658E1A3F-29D6-48D2-BCCE-0BCC41AC49F6",
                     versionEndExcluding: "21.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAF09D6E-3375-4731-B16D-30B7592EA5FB",
                     versionEndExcluding: "5.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A3CA33C-AFAB-418F-870F-0236B8E55943",
                     versionEndIncluding: "16",
                     versionStartIncluding: "13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_step_7:5.6:-:*:*:*:*:*:*",
                     matchCriteriaId: "851F8474-4568-487D-98FB-47DF7EAEAC3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_step_7:5.6:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "81EADA2F-884C-4D72-8489-71025B3EBAEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_step_7:5.6:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "78366D2F-B728-47F6-B539-5FB2D1B0419D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_step_7:5.6:sp2_hotfix1:*:*:*:*:*:*",
                     matchCriteriaId: "06A86DA0-BC1F-4306-B02E-ED2FA36BE273",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F39B396-140B-4005-9A61-F984C9FAF742",
                     versionEndExcluding: "7.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3B0BD5DE-C6EF-4B89-831B-DA34DB0D68F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "2637C346-8AAF-481F-AFB0-BAD4254D14F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:*",
                     matchCriteriaId: "BF8404AB-579E-4C6B-BCA7-E95F2CE24F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:*",
                     matchCriteriaId: "88F6B3BF-727F-432E-89D8-37FB7C76FE2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:*",
                     matchCriteriaId: "62EB588C-CBB4-4B17-9BB5-B14B1FC6BB21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:*",
                     matchCriteriaId: "AF3F613C-6707-4517-B4B8-530C912B79E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:*",
                     matchCriteriaId: "590F62CE-9245-4AC9-9FBC-35136E217B0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:*",
                     matchCriteriaId: "241D5A28-FB22-4C5B-A067-733168E847BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:*",
                     matchCriteriaId: "A5418F92-84A9-439C-B86C-ED5820697603",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:*",
                     matchCriteriaId: "40631FBD-116B-4589-B77A-6C5A69990F73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:*",
                     matchCriteriaId: "64B14972-6163-4D44-A9C6-16328E02AC69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:*",
                     matchCriteriaId: "8929E926-740F-4F17-B52C-4C73914B1818",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:*",
                     matchCriteriaId: "D4F72666-D10A-4EB2-80D3-18B04C101256",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:*",
                     matchCriteriaId: "0E343221-1E1A-4EE7-80AE-AB24E2244BA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:*",
                     matchCriteriaId: "1BF716D7-0A77-400F-9B43-64FBE3E65735",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "E79DA14E-419C-49BA-8E4F-2907E1D8937F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "81F9C13C-065C-4E40-BB46-687D791348A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*",
                     matchCriteriaId: "5CF06E69-0A23-418D-B0EC-574DACBB4DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*",
                     matchCriteriaId: "9164EAC1-C416-4F1F-A910-CE84A167A6D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_open_architecture:3.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B9ED7EF-EF58-400F-92C9-3D52D8E39783",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_open_architecture:3.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C3F9210-7A1E-4B10-B384-119FD5733A86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "79EE15DC-74D3-4551-AAD0-EA0CB600DA76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C9253AD-BD82-4BB2-84AD-EB1892B60358",
                     versionEndIncluding: "16",
                     versionStartIncluding: "13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sinamics_startdrive:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11DB09A-74E1-45EF-A162-9C1E91F54C04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sinamics_starter_commissioning_tool:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1976CDDA-F2AF-4C47-804E-2C1DF44FBF41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "52F7076E-12F7-4F62-9804-18598C39D3FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sinema_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C55DA617-6333-40DA-AB7D-EE49A453E143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sinumerik_one_virtual:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A607E4B7-2F58-4F68-91EB-16874986E92F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sinumerik_operate:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAFC5C25-EC3C-4EB6-B5B2-478AE9CEF10F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC Automation Tool (All versions < V4 SP2), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions < V17), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC STEP 7 V5 (All versions < V5.6 SP2 HF3), SIMATIC WinCC OA V3.16 (All versions < V3.16 P018), SIMATIC WinCC OA V3.17 (All versions < V3.17 P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions < V1.0 SP2), SINEMA Server (All versions < V14 SP3), SINUMERIK ONE virtual (All Versions < V6.14), SINUMERIK Operate (All Versions < V6.14). A common component used by the affected applications regularly calls a helper binary with SYSTEM privileges while the call path is not quoted. This could allow a local attacker to execute arbitrary code with SYTEM privileges.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en SIMATIC Automation Tool (Todas las versiones anteriores a la versión V4 SP2), SIMATIC NET PC Software V14 (Todas las versiones anteriores a la versión V14 SP1 Update 14), SIMATIC NET PC Software V15 (Todas las versiones), SIMATIC NET PC Software V16 (Todas las versiones anteriores a la versión V16 Upd3), SIMATIC PCS neo (Todas las versiones anteriores a la versión V3.0 SP1), SIMATIC ProSave (Todas las versiones anteriores a la versión V17), SIMATIC S7-1500 Software Controller (Todas las versiones anteriores a la versión V21. 8), SIMATIC STEP 7 (Todas las versiones anteriores a la versión V5.6 SP2 HF3), SIMATIC STEP 7 (TIA Portal) V13 (Todas las versiones anteriores a la versión V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (Todas las versiones anteriores a la versión V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (Todas las versiones anteriores a la versión V15. 1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (Todas las versiones anteriores a la versión V16 Update 2), SIMATIC WinCC OA V3.16 (Todas las versiones anteriores a la versión V3.16 P018), SIMATIC WinCC OA V3. 17 (Todas las versiones anteriores a la versión V3.17 P003), SIMATIC WinCC Runtime Advanced (Todas las versiones anteriores a la versión V16 Update 2), SIMATIC WinCC Runtime Professional V13 (Todas las versiones anteriores a la versión V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (Todas las versiones anteriores a la versión V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (Todas las versiones anteriores a la versión V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (Todas las versiones anteriores a la versión V16 Update 2), SIMATIC WinCC V7. 4 (Todas las versiones anteriores a la versión V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (Todas las versiones anteriores a la versión V7.5 SP1 Update 3), SINAMICS STARTER (Todas las versiones anteriores a la versión V5.4 HF2), SINAMICS Startdrive (Todas las versiones anteriores a la versión V16 Update 3), SINEC NMS (Todas las versiones anteriores a la versión V1. 0 SP2), SINEMA Server (Todas las versiones anteriores a la versión V14 SP3), SINUMERIK ONE virtual (Todas las versiones anteriores a la versión V6.14), SINUMERIK Operate (Todas las versiones anteriores a la versión V6.14). Un componente dentro de la aplicación afectada llama regularmente a un binario de ayuda con privilegios de SISTEMA mientras la ruta de llamada no está citada",
      },
   ],
   id: "CVE-2020-7580",
   lastModified: "2024-11-21T05:37:24.840",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-10T17:15:12.347",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-312271.pdf",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://us-cert.cisa.gov/ics/advisories/icsa-20-161-04",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-312271.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://us-cert.cisa.gov/ics/advisories/icsa-20-161-04",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-428",
            },
         ],
         source: "productcert@siemens.com",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-428",
            },
         ],
         source: "nvd@nist.gov",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-20 13:15
Modified
2024-11-21 06:50
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC06), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1 UC01), SIMATIC WinCC Runtime Professional V16 and earlier (All versions), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Upd4), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 21), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 8). A missing printer configuration on the host could allow an authenticated attacker to escape the WinCC Kiosk Mode.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA18372-7E7D-4C51-8FA0-EE193DECB88D",
                     versionEndIncluding: "9.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8852CFC7-FE90-4654-9F85-9181884F948E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA2E9785-246F-496B-9139-02E2F4003352",
                     versionEndIncluding: "7.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "E79DA14E-419C-49BA-8E4F-2907E1D8937F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "81F9C13C-065C-4E40-BB46-687D791348A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*",
                     matchCriteriaId: "5CF06E69-0A23-418D-B0EC-574DACBB4DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*",
                     matchCriteriaId: "9164EAC1-C416-4F1F-A910-CE84A167A6D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "3422B714-DB0F-4EE3-A7D4-9A0165214563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*",
                     matchCriteriaId: "70B79B00-F61D-4F10-AD7B-74718F061D9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*",
                     matchCriteriaId: "A8766442-CC8D-4221-89B8-F75D195F71E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*",
                     matchCriteriaId: "26C08FB9-AFEB-4A53-AAB3-37C9717B30C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*",
                     matchCriteriaId: "68896900-7FCC-4BFB-B787-8992B459F00D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update5:*:*:*:*:*:*",
                     matchCriteriaId: "1059B529-02F0-4C85-A35E-2282546FA990",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update6:*:*:*:*:*:*",
                     matchCriteriaId: "938D44C5-7B26-4400-970D-B3AA50DDD055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update7:*:*:*:*:*:*",
                     matchCriteriaId: "E9E28D92-0643-4967-94C5-8B8F414158A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC34D005-A65F-4AFE-BF1F-53A5AC950A22",
                     versionEndIncluding: "16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:17:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B76C5CC-652F-4117-8214-E219C12AA082",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC06), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1 UC01), SIMATIC WinCC Runtime Professional V16 and earlier (All versions), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Upd4), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 21), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 8). A missing printer configuration on the host could allow an authenticated attacker to escape the WinCC Kiosk Mode.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en SIMATIC PCS 7 V9.0 y anteriores (Todas las versiones), SIMATIC PCS 7 V9.1 (Todas las versiones anteriores V9.1 SP1 UC01), SIMATIC WinCC Runtime Professional V16 y anteriores (Todas las versiones), SIMATIC WinCC Runtime Professional V17 (Todas las versiones anteriores V17 Upd4), SIMATIC WinCC V7.4 y anteriores (Todas las versiones), SIMATIC WinCC V7.5 (Todas las versiones anteriores V7.5 SP2 Update 8). Un atacante autenticado podría escapar del modo quiosco de WinCC abriendo el cuadro de diálogo de la impresora en la aplicación afectada en caso de que no haya ninguna impresora instalada",
      },
   ],
   id: "CVE-2022-24287",
   lastModified: "2024-11-21T06:50:05.667",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "productcert@siemens.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Secondary",
         },
      ],
   },
   published: "2022-05-20T13:15:14.680",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-363107.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-363107.pdf",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1188",
            },
         ],
         source: "productcert@siemens.com",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-1188",
            },
         ],
         source: "nvd@nist.gov",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-04-24 17:29
Modified
2024-11-21 04:07
Summary
A vulnerability has been identified in OpenPCS 7 V7.1 and earlier (All versions), OpenPCS 7 V8.0 (All versions), OpenPCS 7 V8.1 (All versions < V8.1 Upd5), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd1), SIMATIC BATCH V7.1 and earlier (All versions), SIMATIC BATCH V8.0 (All versions < V8.0 SP1 Upd21), SIMATIC BATCH V8.1 (All versions < V8.1 SP1 Upd16), SIMATIC BATCH V8.2 (All versions < V8.2 Upd10), SIMATIC BATCH V9.0 (All versions < V9.0 SP1), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions < 15 SP1), SIMATIC PCS 7 V7.1 and earlier (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP1), SIMATIC Route Control V7.1 and earlier (All versions), SIMATIC Route Control V8.0 (All versions), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Upd2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Upd5), SIMATIC WinCC V7.2 and earlier (All versions < WinCC 7.2 Upd 15), SIMATIC WinCC V7.3 (All versions < WinCC 7.3 Upd 16), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 4), SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). Specially crafted messages sent to the RPC service of the affected products could cause a Denial-of-Service condition on the remote and local communication functionality of the affected products. A reboot of the system is required to recover the remote and local communication functionality. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2CDCCD5-E4C7-4E52-8316-07F93E820842",
                     versionEndIncluding: "7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "63F01837-6121-48E3-A18C-691AAC2800BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:8.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "781DC7D3-D470-465E-8E0A-9978CB2A6454",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:8.1:upd_1:*:*:*:*:*:*",
                     matchCriteriaId: "726E5A2D-97EA-415A-A251-66A975B3F98C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:8.1:upd_2:*:*:*:*:*:*",
                     matchCriteriaId: "ED9B2A87-0C1E-476E-AF7E-71EAB0CECEF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:8.1:upd_3:*:*:*:*:*:*",
                     matchCriteriaId: "20D3788F-FD9E-4A0F-A7C7-843B1ED67D34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:8.1:upd_4:*:*:*:*:*:*",
                     matchCriteriaId: "F8186041-B1D6-4460-ACA7-23494D1F0E7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF8FF2D9-B31F-46DC-AF37-E0314F3D0B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3890EC18-2B5D-4B5A-8B21-6A0D1211EA98",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E94E0B9-2950-42CA-837E-7900F820A9F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:8.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "2C782AC7-6EAB-4F35-A646-52A4AC77E1D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:8.0:sp1_upd20:*:*:*:*:*:*",
                     matchCriteriaId: "3C509A97-9DD2-413A-A7ED-B30FD9E5C98F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:8.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "EE12DBC8-CD75-4517-BD3B-709E98B4D280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:8.1:sp1_upd14:*:*:*:*:*:*",
                     matchCriteriaId: "38894CBB-44DA-4690-B762-4AA497C95037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:8.1:sp1_upd15:*:*:*:*:*:*",
                     matchCriteriaId: "59178885-4A50-4AC6-A3BE-B288A1F6B5F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:8.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "4CAFD7F2-BB23-4E3A-A30E-78290D5EAB47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:8.2:upd_9:*:*:*:*:*:*",
                     matchCriteriaId: "F043FAC3-661C-4226-AA70-7EF836DDBA55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E1EFC3E-F29B-48C5-869C-F356414C8088",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_net_pc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C06726E-497A-4FEF-8B4B-AF3F7B0EEFA4",
                     versionEndExcluding: "15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_net_pc:15:-:*:*:*:*:*:*",
                     matchCriteriaId: "7DF90C44-4AC2-4B2B-8712-30CD3DE96B22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DFBFF6B-DBC8-451D-A235-4C7E1F0883D5",
                     versionEndIncluding: "7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3566C20F-A4A7-494F-AAD2-A11B0AD783D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "858628AC-EA69-4D72-AE23-77A4A8DE2547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:8.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "3EEF9BE1-F6E2-4C05-8020-4D7540882464",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "A42E3FB0-6C66-4702-BDC8-39EEA54B5C0F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_route_control:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20927394-2126-48C5-B0D5-88E16B6491DA",
                     versionEndIncluding: "7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_route_control:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACF395C1-AA95-4064-BDEF-9B3C30FF6B29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_route_control:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF693D1E-091C-4CBE-957C-58C47B4E44D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_route_control:9.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "57073CE8-174E-429D-A721-AB14C7D16D4F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AAE5EBD-1B43-447D-8C19-9D3296F137F9",
                     versionEndExcluding: "13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:13:-:*:*:*:*:*:*",
                     matchCriteriaId: "00B0EEF6-E1F9-4AEB-82AA-445D161639D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:13:sp2_upd_1:*:*:*:*:*:*",
                     matchCriteriaId: "DB8D7040-0223-413F-B87F-3417CFA50BB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:14:-:*:*:*:*:*:*",
                     matchCriteriaId: "17F622A5-75AE-4E5C-80CB-53C39EAE356D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:14:sp1_upd_4:*:*:*:*:*:*",
                     matchCriteriaId: "8D2F5FA7-6B23-413C-AF6D-CA95EDA59212",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9C72CD2-86C8-4E79-AF98-A3D58E882DED",
                     versionEndExcluding: "7.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "EF42322A-1E6E-44F6-B943-DC56E87F80D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.2:upd_14:*:*:*:*:*:*",
                     matchCriteriaId: "A54099D6-1E2E-4DC5-98FD-6004758C581A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.3:-:*:*:*:*:*:*",
                     matchCriteriaId: "AE3690D0-60A7-4E52-A36A-ADBA01F8D99F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.3:upd_15:*:*:*:*:*:*",
                     matchCriteriaId: "98174EBE-EC43-431C-B943-11B21A167A79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*",
                     matchCriteriaId: "3B0BD5DE-C6EF-4B89-831B-DA34DB0D68F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "2637C346-8AAF-481F-AFB0-BAD4254D14F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_upd_3:*:*:*:*:*:*",
                     matchCriteriaId: "9A699260-A239-46BE-BF64-A767D4F267FC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:sppa-t3000_application_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CE233B0-3F20-4FA8-8E26-CCC3E21E49E1",
                     versionEndExcluding: "r8.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sppa-t3000_application_server:r8.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "4EBA7673-3A24-4DF7-9D9C-4B863863083C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:sppa-t3000_application_server:r8.2:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "D0975E8C-C34F-4BD2-B4CF-41E5FBFD8A12",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_net_pc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C06726E-497A-4FEF-8B4B-AF3F7B0EEFA4",
                     versionEndExcluding: "15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_net_pc:15:-:*:*:*:*:*:*",
                     matchCriteriaId: "7DF90C44-4AC2-4B2B-8712-30CD3DE96B22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_net_pc_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A28DF82-4863-47FA-82FF-C3D63CFB1782",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in OpenPCS 7 V7.1 and earlier (All versions), OpenPCS 7 V8.0 (All versions), OpenPCS 7 V8.1 (All versions < V8.1 Upd5), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd1), SIMATIC BATCH V7.1 and earlier (All versions), SIMATIC BATCH V8.0 (All versions < V8.0 SP1 Upd21), SIMATIC BATCH V8.1 (All versions < V8.1 SP1 Upd16), SIMATIC BATCH V8.2 (All versions < V8.2 Upd10), SIMATIC BATCH V9.0 (All versions < V9.0 SP1), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions < 15 SP1), SIMATIC PCS 7 V7.1 and earlier (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP1), SIMATIC Route Control V7.1 and earlier (All versions), SIMATIC Route Control V8.0 (All versions), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Upd2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Upd5), SIMATIC WinCC V7.2 and earlier (All versions < WinCC 7.2 Upd 15), SIMATIC WinCC V7.3 (All versions < WinCC 7.3 Upd 16), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 4), SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). Specially crafted messages sent to the RPC service of the affected products could cause a Denial-of-Service condition on the remote and local communication functionality of the affected products. A reboot of the system is required to recover the remote and local communication functionality. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en OpenPCS 7 V7.1 y anteriores (Todas las versiones), OpenPCS 7 V8.0 (Todas las versiones), OpenPCS 7 V8.1 (Todas las versiones anteriores a V8.1 Upd5), OpenPCS 7 V8. 2 (Todas las versiones), OpenPCS 7 V9.0 (Todas las versiones anteriores a V9.0 Upd1), SIMATIC BATCH V7.1 y anteriores (Todas las versiones), SIMATIC BATCH V8.0 (Todas las versiones anteriores a V8.0 SP1 Upd21), SIMATIC BATCH V8.1 (Todas las versiones anteriores a V8. 1 SP1 Upd16), SIMATIC BATCH V8.2 (Todas las versiones anteriores a V8.2 Upd10), SIMATIC BATCH V9.0 (Todas las versiones anteriores a V9.0 SP1), SIMATIC NET PC Software V14 (Todas las versiones anteriores a V14 SP1 Update 14), SIMATIC NET PC Software V15 (Todas las versiones anteriores a 15 SP1), SIMATIC PCS 7 V7. 1 y anteriores (Todas las versiones), SIMATIC PCS 7 V8.0 (Todas las versiones), SIMATIC PCS 7 V8.1 (Todas las versiones), SIMATIC PCS 7 V8. 2 (Todas las versiones anteriores a V8.2 SP1), SIMATIC PCS 7 V9.0 (Todas las versiones anteriores a V9.0 SP1), SIMATIC Route Control V7.1 y anteriores (Todas las versiones), SIMATIC Route Control V8.0 (Todas las versiones), SIMATIC Route Control V8.1 (Todas las versiones), SIMATIC Route Control V8.2 (Todas las versiones), SIMATIC Route Control V9.0 (Todas las versiones anteriores a V9. 0 Upd1), SIMATIC WinCC Runtime Professional V13 (Todas las versiones anteriores a V13 SP2 Upd2), SIMATIC WinCC Runtime Professional V14 (Todas las versiones anteriores a V14 SP1 Upd5), SIMATIC WinCC V7.2 y anteriores (Todas las versiones anteriores a WinCC 7. 2 Upd 15), SIMATIC WinCC V7.3 (Todas las versiones anteriores a WinCC 7.3 Upd 16), SIMATIC WinCC V7.4 (Todas las versiones anteriores a V7.4 SP1 Upd 4), SPPA-T3000 Application Server (Todas las versiones anteriores a Service Pack R8.2 SP2). Los mensajes especialmente diseñados enviados al servicio RPC de los productos afectados podrían causar una condición de denegación de servicio en la funcionalidad de comunicación remota y local de los productos afectados. Es necesario reiniciar el sistema para recuperar la funcionalidad de comunicación remota y local. Tenga en cuenta que un atacante necesita tener acceso a la red del servidor de aplicaciones para poder explotar esta vulnerabilidad. En el momento de la publicación del aviso no se conocía ninguna explotación pública de esta vulnerabilidad de seguridad",
      },
   ],
   id: "CVE-2018-4832",
   lastModified: "2024-11-21T04:07:32.557",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-04-24T17:29:00.227",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-348629.pdf",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-348629.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-13 09:15
Modified
2024-11-21 08:31
Summary
A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain unorganized RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:openpcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1350C78-30BE-4FA0-BE95-7A897C0D1927",
                     versionEndIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_batch:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA5C1EC7-2F78-400D-9F85-FCEF71C4F1D5",
                     versionEndIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDA0756E-97B0-4896-BED4-44E86D6C76DE",
                     versionEndIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_route_control:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0AF2A6B-2A46-4147-AB1C-6E4DD71CD8C2",
                     versionEndIncluding: "9.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F64B795A-7E66-49AE-BE40-E8EEAC12D280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D3A0BA7-EDC9-428D-A9C9-1CF602CEDFB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E57C7724-EEDA-4F6E-8634-65B10C3319A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "872A881A-22F6-47E0-99ED-A83D9F77DB02",
                     versionEndIncluding: "18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:19:*:*:*:*:*:*:*",
                     matchCriteriaId: "18D1C8AC-6A32-4ABB-A52D-58B774A5C9BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) \r\ncommunication protocol in the affected products do not \r\nproperly handle certain unorganized RPC messages. An \r\nattacker could use this vulnerability to cause a denial of service \r\ncondition in the RPC server.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en: \nOpenPCS 7 V9.1 (todas las versiones), \nSIMATIC BATCH V9.1 (todas las versiones), \nSIMATIC PCS 7 V9.1 (todas las versiones), \nSIMATIC Route Control V9.1 (todas las versiones), \nSIMATIC WinCC Runtime Professional V18 (todas las versiones), \nSIMATIC WinCC Runtime Professional V19 (todas las versiones), \nSIMATIC WinCC V7.4 (todas las versiones), \nSIMATIC WinCC V7.5 (todas las versiones &lt; V7.5 SP2 Update 15), \nSIMATIC WinCC V8.0 (Todas las versiones ",
      },
   ],
   id: "CVE-2023-48363",
   lastModified: "2024-11-21T08:31:34.337",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "productcert@siemens.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
      cvssMetricV40: [
         {
            cvssData: {
               Automatable: "NOT_DEFINED",
               Recovery: "NOT_DEFINED",
               Safety: "NOT_DEFINED",
               attackComplexity: "LOW",
               attackRequirements: "NONE",
               attackVector: "ADJACENT",
               availabilityRequirement: "NOT_DEFINED",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityRequirement: "NOT_DEFINED",
               exploitMaturity: "NOT_DEFINED",
               integrityRequirement: "NOT_DEFINED",
               modifiedAttackComplexity: "NOT_DEFINED",
               modifiedAttackRequirements: "NOT_DEFINED",
               modifiedAttackVector: "NOT_DEFINED",
               modifiedPrivilegesRequired: "NOT_DEFINED",
               modifiedSubAvailabilityImpact: "NOT_DEFINED",
               modifiedSubConfidentialityImpact: "NOT_DEFINED",
               modifiedSubIntegrityImpact: "NOT_DEFINED",
               modifiedUserInteraction: "NOT_DEFINED",
               modifiedVulnAvailabilityImpact: "NOT_DEFINED",
               modifiedVulnConfidentialityImpact: "NOT_DEFINED",
               modifiedVulnIntegrityImpact: "NOT_DEFINED",
               privilegesRequired: "NONE",
               providerUrgency: "NOT_DEFINED",
               subAvailabilityImpact: "NONE",
               subConfidentialityImpact: "NONE",
               subIntegrityImpact: "NONE",
               userInteraction: "NONE",
               valueDensity: "NOT_DEFINED",
               vectorString: "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
               version: "4.0",
               vulnAvailabilityImpact: "HIGH",
               vulnConfidentialityImpact: "NONE",
               vulnIntegrityImpact: "NONE",
               vulnerabilityResponseEffort: "NOT_DEFINED",
            },
            source: "productcert@siemens.com",
            type: "Secondary",
         },
      ],
   },
   published: "2024-02-13T09:15:45.763",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/html/ssa-753746.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/html/ssa-753746.html",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-476",
            },
         ],
         source: "productcert@siemens.com",
         type: "Primary",
      },
   ],
}

cve-2019-10916
Vulnerability from cvelistv5
Published
2019-05-14 19:54
Modified
2024-08-04 22:40
Severity ?
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with access to the project file could run arbitrary system commands with the privileges of the local database server. The vulnerability could be exploited by an attacker with access to the project file. The vulnerability does impact the confidentiality, integrity, and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
Impacted products
Vendor Product Version
Siemens AG SIMATIC PCS 7 V8.0 and earlier Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC PCS 7 V8.1 Version: All versions < V8.1 with WinCC V7.3 Upd 19
Create a notification for this product.
   Siemens AG SIMATIC PCS 7 V8.2 Version: All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11
Create a notification for this product.
   Siemens AG SIMATIC PCS 7 V9.0 Version: All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11
Create a notification for this product.
   Siemens AG SIMATIC WinCC (TIA Portal) V13 Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC WinCC (TIA Portal) V14 Version: All versions < V14 SP1 Upd 9
Create a notification for this product.
   Siemens AG SIMATIC WinCC (TIA Portal) V15 Version: All versions < V15.1 Upd 3
Create a notification for this product.
   Siemens AG SIMATIC WinCC Runtime Professional V13 Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC WinCC Runtime Professional V14 Version: All versions < V14.1 Upd 8
Create a notification for this product.
   Siemens AG SIMATIC WinCC Runtime Professional V15 Version: All versions < V15.1 Upd 3
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.2 and earlier Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.3 Version: All versions < V7.3 Upd 19
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.4 Version: All versions < V7.4 SP1 Upd 11
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.5 Version: All versions < V7.5 Upd 3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:40:15.179Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC PCS 7 V8.0 and earlier",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V8.1",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.1 with WinCC V7.3 Upd 19",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V8.2",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V9.0",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal) V13",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal) V14",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14 SP1 Upd 9",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal) V15",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Upd 3",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V13",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V14",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14.1 Upd 8",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V15",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Upd 3",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.2 and earlier",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.3",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.3 Upd 19",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.4",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.4 SP1 Upd 11",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.5",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.5 Upd 3",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with access to the project file could run arbitrary system commands with the privileges of the local database server. The vulnerability could be exploited by an attacker with access to the project file. The vulnerability does impact the confidentiality, integrity, and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-89",
                     description: "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-10-23T19:27:04",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2019-10916",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SIMATIC PCS 7 V8.0 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V8.1",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.1 with WinCC V7.3 Upd 19",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V8.2",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V9.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal) V13",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal) V14",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V14 SP1 Upd 9",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal) V15",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Upd 3",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V13",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V14",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V14.1 Upd 8",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V15",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Upd 3",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.2 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.3",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.3 Upd 19",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.4",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.4 SP1 Upd 11",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.5",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.5 Upd 3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens AG",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with access to the project file could run arbitrary system commands with the privileges of the local database server. The vulnerability could be exploited by an attacker with access to the project file. The vulnerability does impact the confidentiality, integrity, and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
                  },
                  {
                     name: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
                     refsource: "MISC",
                     url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2019-10916",
      datePublished: "2019-05-14T19:54:48",
      dateReserved: "2019-04-08T00:00:00",
      dateUpdated: "2024-08-04T22:40:15.179Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-10918
Vulnerability from cvelistv5
Published
2019-05-14 19:54
Modified
2024-08-04 22:40
Severity ?
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
Impacted products
Vendor Product Version
Siemens AG SIMATIC PCS 7 V8.0 and earlier Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC PCS 7 V8.1 Version: All versions < V8.1 with WinCC V7.3 Upd 19
Create a notification for this product.
   Siemens AG SIMATIC PCS 7 V8.2 Version: All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11
Create a notification for this product.
   Siemens AG SIMATIC PCS 7 V9.0 Version: All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11
Create a notification for this product.
   Siemens AG SIMATIC WinCC (TIA Portal) V13 Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC WinCC (TIA Portal) V14 Version: All versions < V14 SP1 Upd 9
Create a notification for this product.
   Siemens AG SIMATIC WinCC (TIA Portal) V15 Version: All versions < V15.1 Upd 3
Create a notification for this product.
   Siemens AG SIMATIC WinCC Runtime Professional V13 Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC WinCC Runtime Professional V14 Version: All versions < V14.1 Upd 8
Create a notification for this product.
   Siemens AG SIMATIC WinCC Runtime Professional V15 Version: All versions < V15.1 Upd 3
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.2 and earlier Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.3 Version: All versions < V7.3 Upd 19
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.4 Version: All versions < V7.4 SP1 Upd 11
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.5 Version: All versions < V7.5 Upd 3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:40:15.144Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC PCS 7 V8.0 and earlier",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V8.1",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.1 with WinCC V7.3 Upd 19",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V8.2",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V9.0",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal) V13",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal) V14",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14 SP1 Upd 9",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal) V15",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Upd 3",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V13",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V14",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14.1 Upd 8",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V15",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Upd 3",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.2 and earlier",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.3",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.3 Upd 19",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.4",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.4 SP1 Upd 11",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.5",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.5 Upd 3",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-749",
                     description: "CWE-749: Exposed Dangerous Method or Function",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-10-23T19:28:42",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2019-10918",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SIMATIC PCS 7 V8.0 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V8.1",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.1 with WinCC V7.3 Upd 19",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V8.2",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V9.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal) V13",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal) V14",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V14 SP1 Upd 9",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal) V15",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Upd 3",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V13",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V14",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V14.1 Upd 8",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V15",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Upd 3",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.2 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.3",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.3 Upd 19",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.4",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.4 SP1 Upd 11",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.5",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.5 Upd 3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens AG",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-749: Exposed Dangerous Method or Function",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
                  },
                  {
                     name: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
                     refsource: "MISC",
                     url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2019-10918",
      datePublished: "2019-05-14T19:54:48",
      dateReserved: "2019-04-08T00:00:00",
      dateUpdated: "2024-08-04T22:40:15.144Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-5743
Vulnerability from cvelistv5
Published
2016-07-22 15:00
Modified
2024-08-06 01:08
Severity ?
Summary
Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T01:08:00.812Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1036441",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1036441",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
               },
               {
                  name: "92112",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/92112",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-07-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2016-11-25T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1036441",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1036441",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
            },
            {
               name: "92112",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/92112",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-5743",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1036441",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1036441",
                  },
                  {
                     name: "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
                     refsource: "MISC",
                     url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
                  },
                  {
                     name: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
                     refsource: "CONFIRM",
                     url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
                  },
                  {
                     name: "92112",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/92112",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-5743",
      datePublished: "2016-07-22T15:00:00",
      dateReserved: "2016-06-22T00:00:00",
      dateUpdated: "2024-08-06T01:08:00.812Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-48364
Vulnerability from cvelistv5
Published
2024-02-13 08:59
Modified
2024-09-10 09:36
Summary
A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain malformed RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-48364",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-13T16:04:15.175349Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-05T17:21:43.053Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:30:34.447Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-753746.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "OpenPCS 7 V9.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.1 SP2 UC05",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC BATCH V9.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.1 SP2 UC05",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC PCS 7 V9.1",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V9.1 SP2 UC05",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC Route Control V9.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.1 SP2 UC05",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC Runtime Professional V18",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V18 Update 4",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC Runtime Professional V19",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V19 Update 2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC V7.4",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC V7.5",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V7.5 SP2 Update 15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC V8.0",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V8.0 Update 4",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain malformed RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
            {
               cvssV4_0: {
                  baseScore: 7.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                  version: "4.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "CWE-476: NULL Pointer Dereference",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-09-10T09:36:24.190Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-753746.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2023-48364",
      datePublished: "2024-02-13T08:59:56.648Z",
      dateReserved: "2023-11-15T17:20:32.751Z",
      dateUpdated: "2024-09-10T09:36:24.190Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-48363
Vulnerability from cvelistv5
Published
2024-02-13 08:59
Modified
2024-09-10 09:36
Summary
A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain unorganized RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-48363",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-13T16:37:22.994141Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-05T17:21:43.194Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:30:34.556Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-753746.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "OpenPCS 7 V9.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.1 SP2 UC05",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC BATCH V9.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.1 SP2 UC05",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC PCS 7 V9.1",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V9.1 SP2 UC05",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC Route Control V9.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.1 SP2 UC05",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC Runtime Professional V18",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V18 Update 4",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC Runtime Professional V19",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V19 Update 2",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC V7.4",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC V7.5",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V7.5 SP2 Update 15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC V8.0",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V8.0 Update 4",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) \r\ncommunication protocol in the affected products do not \r\nproperly handle certain unorganized RPC messages. An \r\nattacker could use this vulnerability to cause a denial of service \r\ncondition in the RPC server.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
            {
               cvssV4_0: {
                  baseScore: 7.1,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                  version: "4.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-476",
                     description: "CWE-476: NULL Pointer Dereference",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-09-10T09:36:22.958Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-753746.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2023-48363",
      datePublished: "2024-02-13T08:59:55.432Z",
      dateReserved: "2023-11-15T17:20:32.751Z",
      dateUpdated: "2024-09-10T09:36:22.958Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-4832
Vulnerability from cvelistv5
Published
2018-04-24 17:00
Modified
2024-08-05 05:18
Severity ?
Summary
A vulnerability has been identified in OpenPCS 7 V7.1 and earlier (All versions), OpenPCS 7 V8.0 (All versions), OpenPCS 7 V8.1 (All versions < V8.1 Upd5), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd1), SIMATIC BATCH V7.1 and earlier (All versions), SIMATIC BATCH V8.0 (All versions < V8.0 SP1 Upd21), SIMATIC BATCH V8.1 (All versions < V8.1 SP1 Upd16), SIMATIC BATCH V8.2 (All versions < V8.2 Upd10), SIMATIC BATCH V9.0 (All versions < V9.0 SP1), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions < 15 SP1), SIMATIC PCS 7 V7.1 and earlier (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP1), SIMATIC Route Control V7.1 and earlier (All versions), SIMATIC Route Control V8.0 (All versions), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Upd2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Upd5), SIMATIC WinCC V7.2 and earlier (All versions < WinCC 7.2 Upd 15), SIMATIC WinCC V7.3 (All versions < WinCC 7.3 Upd 16), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 4), SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). Specially crafted messages sent to the RPC service of the affected products could cause a Denial-of-Service condition on the remote and local communication functionality of the affected products. A reboot of the system is required to recover the remote and local communication functionality. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
Impacted products
Vendor Product Version
Siemens OpenPCS 7 V7.1 and earlier Version: All versions
Create a notification for this product.
   Siemens OpenPCS 7 V8.0 Version: All versions
Create a notification for this product.
   Siemens OpenPCS 7 V8.1 Version: All versions < V8.1 Upd5
Create a notification for this product.
   Siemens OpenPCS 7 V8.2 Version: All versions
Create a notification for this product.
   Siemens OpenPCS 7 V9.0 Version: All versions < V9.0 Upd1
Create a notification for this product.
   Siemens SIMATIC BATCH V7.1 and earlier Version: All versions
Create a notification for this product.
   Siemens SIMATIC BATCH V8.0 Version: All versions < V8.0 SP1 Upd21
Create a notification for this product.
   Siemens SIMATIC BATCH V8.1 Version: All versions < V8.1 SP1 Upd16
Create a notification for this product.
   Siemens SIMATIC BATCH V8.2 Version: All versions < V8.2 Upd10
Create a notification for this product.
   Siemens SIMATIC BATCH V9.0 Version: All versions < V9.0 SP1
Create a notification for this product.
   Siemens SIMATIC NET PC Software V14 Version: All versions < V14 SP1 Update 14
Create a notification for this product.
   Siemens SIMATIC NET PC Software V15 Version: All versions < 15 SP1
Create a notification for this product.
   Siemens SIMATIC PCS 7 V7.1 and earlier Version: All versions
Create a notification for this product.
   Siemens SIMATIC PCS 7 V8.0 Version: All versions
Create a notification for this product.
   Siemens SIMATIC PCS 7 V8.1 Version: All versions
Create a notification for this product.
   Siemens SIMATIC PCS 7 V8.2 Version: All versions < V8.2 SP1
Create a notification for this product.
   Siemens SIMATIC PCS 7 V9.0 Version: All versions < V9.0 SP1
Create a notification for this product.
   Siemens SIMATIC Route Control V7.1 and earlier Version: All versions
Create a notification for this product.
   Siemens SIMATIC Route Control V8.0 Version: All versions
Create a notification for this product.
   Siemens SIMATIC Route Control V8.1 Version: All versions
Create a notification for this product.
   Siemens SIMATIC Route Control V8.2 Version: All versions
Create a notification for this product.
   Siemens SIMATIC Route Control V9.0 Version: All versions < V9.0 Upd1
Create a notification for this product.
   Siemens SIMATIC WinCC Runtime Professional V13 Version: All versions < V13 SP2 Upd2
Create a notification for this product.
   Siemens SIMATIC WinCC Runtime Professional V14 Version: All versions < V14 SP1 Upd5
Create a notification for this product.
   Siemens SIMATIC WinCC V7.2 and earlier Version: All versions < WinCC 7.2 Upd 15
Create a notification for this product.
   Siemens SIMATIC WinCC V7.3 Version: All versions < WinCC 7.3 Upd 16
Create a notification for this product.
   Siemens SIMATIC WinCC V7.4 Version: All versions < V7.4 SP1 Upd 4
Create a notification for this product.
   Siemens SPPA-T3000 Application Server Version: All versions < Service Pack R8.2 SP2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T05:18:26.633Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-348629.pdf",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "OpenPCS 7 V7.1 and earlier",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "OpenPCS 7 V8.0",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "OpenPCS 7 V8.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.1 Upd5",
                  },
               ],
            },
            {
               product: "OpenPCS 7 V8.2",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "OpenPCS 7 V9.0",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.0 Upd1",
                  },
               ],
            },
            {
               product: "SIMATIC BATCH V7.1 and earlier",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC BATCH V8.0",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.0 SP1 Upd21",
                  },
               ],
            },
            {
               product: "SIMATIC BATCH V8.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.1 SP1 Upd16",
                  },
               ],
            },
            {
               product: "SIMATIC BATCH V8.2",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.2 Upd10",
                  },
               ],
            },
            {
               product: "SIMATIC BATCH V9.0",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.0 SP1",
                  },
               ],
            },
            {
               product: "SIMATIC NET PC Software V14",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14 SP1 Update 14",
                  },
               ],
            },
            {
               product: "SIMATIC NET PC Software V15",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < 15 SP1",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V7.1 and earlier",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V8.0",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V8.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V8.2",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.2 SP1",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V9.0",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.0 SP1",
                  },
               ],
            },
            {
               product: "SIMATIC Route Control V7.1 and earlier",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC Route Control V8.0",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC Route Control V8.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC Route Control V8.2",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC Route Control V9.0",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.0 Upd1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V13",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V13 SP2 Upd2",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V14",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14 SP1 Upd5",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.2 and earlier",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < WinCC 7.2 Upd 15",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.3",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < WinCC 7.3 Upd 16",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.4",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.4 SP1 Upd 4",
                  },
               ],
            },
            {
               product: "SPPA-T3000 Application Server",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < Service Pack R8.2 SP2",
                  },
               ],
            },
         ],
         datePublic: "2018-03-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in OpenPCS 7 V7.1 and earlier (All versions), OpenPCS 7 V8.0 (All versions), OpenPCS 7 V8.1 (All versions < V8.1 Upd5), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd1), SIMATIC BATCH V7.1 and earlier (All versions), SIMATIC BATCH V8.0 (All versions < V8.0 SP1 Upd21), SIMATIC BATCH V8.1 (All versions < V8.1 SP1 Upd16), SIMATIC BATCH V8.2 (All versions < V8.2 Upd10), SIMATIC BATCH V9.0 (All versions < V9.0 SP1), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions < 15 SP1), SIMATIC PCS 7 V7.1 and earlier (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP1), SIMATIC Route Control V7.1 and earlier (All versions), SIMATIC Route Control V8.0 (All versions), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Upd2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Upd5), SIMATIC WinCC V7.2 and earlier (All versions < WinCC 7.2 Upd 15), SIMATIC WinCC V7.3 (All versions < WinCC 7.3 Upd 16), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 4), SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). Specially crafted messages sent to the RPC service of the affected products could cause a Denial-of-Service condition on the remote and local communication functionality of the affected products. A reboot of the system is required to recover the remote and local communication functionality. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-20",
                     description: "CWE-20: Improper Input Validation",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-12T09:06:48",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-348629.pdf",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2018-4832",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "OpenPCS 7 V7.1 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "OpenPCS 7 V8.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "OpenPCS 7 V8.1",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.1 Upd5",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "OpenPCS 7 V8.2",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "OpenPCS 7 V9.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V9.0 Upd1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC BATCH V7.1 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC BATCH V8.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.0 SP1 Upd21",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC BATCH V8.1",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.1 SP1 Upd16",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC BATCH V8.2",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.2 Upd10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC BATCH V9.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V9.0 SP1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC NET PC Software V14",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V14 SP1 Update 14",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC NET PC Software V15",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < 15 SP1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V7.1 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V8.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V8.1",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V8.2",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.2 SP1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V9.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V9.0 SP1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC Route Control V7.1 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC Route Control V8.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC Route Control V8.1",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC Route Control V8.2",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC Route Control V9.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V9.0 Upd1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V13",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V13 SP2 Upd2",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V14",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V14 SP1 Upd5",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.2 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < WinCC 7.2 Upd 15",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.3",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < WinCC 7.3 Upd 16",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.4",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.4 SP1 Upd 4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SPPA-T3000 Application Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < Service Pack R8.2 SP2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in OpenPCS 7 V7.1 and earlier (All versions), OpenPCS 7 V8.0 (All versions), OpenPCS 7 V8.1 (All versions < V8.1 Upd5), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd1), SIMATIC BATCH V7.1 and earlier (All versions), SIMATIC BATCH V8.0 (All versions < V8.0 SP1 Upd21), SIMATIC BATCH V8.1 (All versions < V8.1 SP1 Upd16), SIMATIC BATCH V8.2 (All versions < V8.2 Upd10), SIMATIC BATCH V9.0 (All versions < V9.0 SP1), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions < 15 SP1), SIMATIC PCS 7 V7.1 and earlier (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP1), SIMATIC Route Control V7.1 and earlier (All versions), SIMATIC Route Control V8.0 (All versions), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Upd2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Upd5), SIMATIC WinCC V7.2 and earlier (All versions < WinCC 7.2 Upd 15), SIMATIC WinCC V7.3 (All versions < WinCC 7.3 Upd 16), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 4), SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). Specially crafted messages sent to the RPC service of the affected products could cause a Denial-of-Service condition on the remote and local communication functionality of the affected products. A reboot of the system is required to recover the remote and local communication functionality. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-20: Improper Input Validation",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf",
                     refsource: "MISC",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-348629.pdf",
                     refsource: "MISC",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-348629.pdf",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2018-4832",
      datePublished: "2018-04-24T17:00:00",
      dateReserved: "2018-01-02T00:00:00",
      dateUpdated: "2024-08-05T05:18:26.633Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-7580
Vulnerability from cvelistv5
Published
2020-06-10 00:00
Modified
2024-08-04 09:33
Severity ?
Summary
A vulnerability has been identified in SIMATIC Automation Tool (All versions < V4 SP2), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions < V17), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC STEP 7 V5 (All versions < V5.6 SP2 HF3), SIMATIC WinCC OA V3.16 (All versions < V3.16 P018), SIMATIC WinCC OA V3.17 (All versions < V3.17 P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions < V1.0 SP2), SINEMA Server (All versions < V14 SP3), SINUMERIK ONE virtual (All Versions < V6.14), SINUMERIK Operate (All Versions < V6.14). A common component used by the affected applications regularly calls a helper binary with SYSTEM privileges while the call path is not quoted. This could allow a local attacker to execute arbitrary code with SYTEM privileges.
Impacted products
Vendor Product Version
Siemens SIMATIC Automation Tool Version: All versions < V4 SP2
Create a notification for this product.
   Siemens SIMATIC NET PC Software V14 Version: All versions < V14 SP1 Update 14
Create a notification for this product.
   Siemens SIMATIC NET PC Software V15 Version: All versions
Create a notification for this product.
   Siemens SIMATIC NET PC Software V16 Version: All versions < V16 Upd3
Create a notification for this product.
   Siemens SIMATIC PCS neo Version: All versions < V3.0 SP1
Create a notification for this product.
   Siemens SIMATIC ProSave Version: All versions < V17
Create a notification for this product.
   Siemens SIMATIC S7-1500 Software Controller Version: All versions < V21.8
Create a notification for this product.
   Siemens SIMATIC STEP 7 (TIA Portal) V13 Version: All versions < V13 SP2 Update 4
Create a notification for this product.
   Siemens SIMATIC STEP 7 (TIA Portal) V14 Version: All versions < V14 SP1 Update 10
Create a notification for this product.
   Siemens SIMATIC STEP 7 (TIA Portal) V15 Version: All versions < V15.1 Update 5
Create a notification for this product.
   Siemens SIMATIC STEP 7 (TIA Portal) V16 Version: All versions < V16 Update 2
Create a notification for this product.
   Siemens SIMATIC STEP 7 V5 Version: All versions < V5.6 SP2 HF3
Create a notification for this product.
   Siemens SIMATIC WinCC OA V3.16 Version: All versions < V3.16 P018
Create a notification for this product.
   Siemens SIMATIC WinCC OA V3.17 Version: All versions < V3.17 P003
Create a notification for this product.
   Siemens SIMATIC WinCC Runtime Advanced Version: All versions < V16 Update 2
Create a notification for this product.
   Siemens SIMATIC WinCC Runtime Professional V13 Version: All versions < V13 SP2 Update 4
Create a notification for this product.
   Siemens SIMATIC WinCC Runtime Professional V14 Version: All versions < V14 SP1 Update 10
Create a notification for this product.
   Siemens SIMATIC WinCC Runtime Professional V15 Version: All versions < V15.1 Update 5
Create a notification for this product.
   Siemens SIMATIC WinCC Runtime Professional V16 Version: All versions < V16 Update 2
Create a notification for this product.
   Siemens SIMATIC WinCC V7.4 Version: All versions < V7.4 SP1 Update 14
Create a notification for this product.
   Siemens SIMATIC WinCC V7.5 Version: All versions < V7.5 SP1 Update 3
Create a notification for this product.
   Siemens SINAMICS STARTER Version: All Versions < V5.4 HF2
Create a notification for this product.
   Siemens SINAMICS Startdrive Version: All Versions < V16 Update 3
Create a notification for this product.
   Siemens SINEC NMS Version: All versions < V1.0 SP2
Create a notification for this product.
   Siemens SINEMA Server Version: All versions < V14 SP3
Create a notification for this product.
   Siemens SINUMERIK ONE virtual Version: All Versions < V6.14
Create a notification for this product.
   Siemens SINUMERIK Operate Version: All Versions < V6.14
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T09:33:19.492Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-312271.pdf",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://us-cert.cisa.gov/ics/advisories/icsa-20-161-04",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC Automation Tool",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V4 SP2",
                  },
               ],
            },
            {
               product: "SIMATIC NET PC Software V14",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14 SP1 Update 14",
                  },
               ],
            },
            {
               product: "SIMATIC NET PC Software V15",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC NET PC Software V16",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V16 Upd3",
                  },
               ],
            },
            {
               product: "SIMATIC PCS neo",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V3.0 SP1",
                  },
               ],
            },
            {
               product: "SIMATIC ProSave",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V17",
                  },
               ],
            },
            {
               product: "SIMATIC S7-1500 Software Controller",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V21.8",
                  },
               ],
            },
            {
               product: "SIMATIC STEP 7 (TIA Portal) V13",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V13 SP2 Update 4",
                  },
               ],
            },
            {
               product: "SIMATIC STEP 7 (TIA Portal) V14",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14 SP1 Update 10",
                  },
               ],
            },
            {
               product: "SIMATIC STEP 7 (TIA Portal) V15",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 5",
                  },
               ],
            },
            {
               product: "SIMATIC STEP 7 (TIA Portal) V16",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V16 Update 2",
                  },
               ],
            },
            {
               product: "SIMATIC STEP 7 V5",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V5.6 SP2 HF3",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC OA V3.16",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V3.16 P018",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC OA V3.17",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V3.17 P003",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Advanced",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V16 Update 2",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V13",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V13 SP2 Update 4",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V14",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14 SP1 Update 10",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V15",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 5",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V16",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V16 Update 2",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.4",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.4 SP1 Update 14",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.5",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.5 SP1 Update 3",
                  },
               ],
            },
            {
               product: "SINAMICS STARTER",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All Versions < V5.4 HF2",
                  },
               ],
            },
            {
               product: "SINAMICS Startdrive",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All Versions < V16 Update 3",
                  },
               ],
            },
            {
               product: "SINEC NMS",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V1.0 SP2",
                  },
               ],
            },
            {
               product: "SINEMA Server",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14 SP3",
                  },
               ],
            },
            {
               product: "SINUMERIK ONE virtual",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All Versions < V6.14",
                  },
               ],
            },
            {
               product: "SINUMERIK Operate",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All Versions < V6.14",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC Automation Tool (All versions < V4 SP2), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions < V17), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC STEP 7 V5 (All versions < V5.6 SP2 HF3), SIMATIC WinCC OA V3.16 (All versions < V3.16 P018), SIMATIC WinCC OA V3.17 (All versions < V3.17 P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions < V1.0 SP2), SINEMA Server (All versions < V14 SP3), SINUMERIK ONE virtual (All Versions < V6.14), SINUMERIK Operate (All Versions < V6.14). A common component used by the affected applications regularly calls a helper binary with SYSTEM privileges while the call path is not quoted. This could allow a local attacker to execute arbitrary code with SYTEM privileges.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-428",
                     description: "CWE-428: Unquoted Search Path or Element",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-12-13T00:00:00",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-312271.pdf",
            },
            {
               url: "https://us-cert.cisa.gov/ics/advisories/icsa-20-161-04",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2020-7580",
      datePublished: "2020-06-10T00:00:00",
      dateReserved: "2020-01-21T00:00:00",
      dateUpdated: "2024-08-04T09:33:19.492Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-24287
Vulnerability from cvelistv5
Published
2022-05-10 09:46
Modified
2025-04-21 13:53
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC06), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1 UC01), SIMATIC WinCC Runtime Professional V16 and earlier (All versions), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Upd4), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 21), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 8). A missing printer configuration on the host could allow an authenticated attacker to escape the WinCC Kiosk Mode.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:07:02.492Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-363107.pdf",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-24287",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-18T15:23:35.293523Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-21T13:53:48.015Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "SIMATIC PCS 7 V8.2",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC PCS 7 V9.0",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.0 SP3 UC06",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC PCS 7 V9.1",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.1 SP1 UC01",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC Runtime Professional V16 and earlier",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC Runtime Professional V17",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V17 Upd4",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC V7.3",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC V7.4",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.4 SP1 Update 21",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC WinCC V7.5",
               vendor: "Siemens",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.5 SP2 Update 8",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC06), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1 UC01), SIMATIC WinCC Runtime Professional V16 and earlier (All versions), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Upd4), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 21), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 8). A missing printer configuration on the host could allow an authenticated attacker to escape the WinCC Kiosk Mode.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-1188",
                     description: "CWE-1188: Insecure Default Initialization of Resource",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-14T11:03:11.010Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-363107.pdf",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2022-24287",
      datePublished: "2022-05-10T09:46:57.000Z",
      dateReserved: "2022-02-01T00:00:00.000Z",
      dateUpdated: "2025-04-21T13:53:48.015Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-10917
Vulnerability from cvelistv5
Published
2019-05-14 19:54
Modified
2024-08-04 22:40
Severity ?
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with local access to the project file could cause a Denial-of-Service condition on the affected product while the project file is loaded. Successful exploitation requires access to the project file. An attacker could use the vulnerability to compromise availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
Impacted products
Vendor Product Version
Siemens AG SIMATIC PCS 7 V8.0 and earlier Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC PCS 7 V8.1 Version: All versions < V8.1 with WinCC V7.3 Upd 19
Create a notification for this product.
   Siemens AG SIMATIC PCS 7 V8.2 Version: All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11
Create a notification for this product.
   Siemens AG SIMATIC PCS 7 V9.0 Version: All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11
Create a notification for this product.
   Siemens AG SIMATIC WinCC (TIA Portal) V13 Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC WinCC (TIA Portal) V14 Version: All versions < V14 SP1 Upd 9
Create a notification for this product.
   Siemens AG SIMATIC WinCC (TIA Portal) V15 Version: All versions < V15.1 Upd 3
Create a notification for this product.
   Siemens AG SIMATIC WinCC Runtime Professional V13 Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC WinCC Runtime Professional V14 Version: All versions < V14.1 Upd 8
Create a notification for this product.
   Siemens AG SIMATIC WinCC Runtime Professional V15 Version: All versions < V15.1 Upd 3
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.2 and earlier Version: All versions
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.3 Version: All versions < V7.3 Upd 19
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.4 Version: All versions < V7.4 SP1 Upd 11
Create a notification for this product.
   Siemens AG SIMATIC WinCC V7.5 Version: All versions < V7.5 Upd 3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:40:15.224Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC PCS 7 V8.0 and earlier",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V8.1",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.1 with WinCC V7.3 Upd 19",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V8.2",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11",
                  },
               ],
            },
            {
               product: "SIMATIC PCS 7 V9.0",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal) V13",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal) V14",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14 SP1 Upd 9",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal) V15",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Upd 3",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V13",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V14",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V14.1 Upd 8",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional V15",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Upd 3",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.2 and earlier",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.3",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.3 Upd 19",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.4",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.4 SP1 Upd 11",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC V7.5",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V7.5 Upd 3",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with local access to the project file could cause a Denial-of-Service condition on the affected product while the project file is loaded. Successful exploitation requires access to the project file. An attacker could use the vulnerability to compromise availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-248",
                     description: "CWE-248: Uncaught Exception",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-10-23T19:28:02",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2019-10917",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SIMATIC PCS 7 V8.0 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V8.1",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.1 with WinCC V7.3 Upd 19",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V8.2",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC PCS 7 V9.0",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal) V13",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal) V14",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V14 SP1 Upd 9",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal) V15",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Upd 3",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V13",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V14",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V14.1 Upd 8",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional V15",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Upd 3",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.2 and earlier",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.3",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.3 Upd 19",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.4",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.4 SP1 Upd 11",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC V7.5",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V7.5 Upd 3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens AG",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with local access to the project file could cause a Denial-of-Service condition on the affected product while the project file is loaded. Successful exploitation requires access to the project file. An attacker could use the vulnerability to compromise availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-248: Uncaught Exception",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf",
                  },
                  {
                     name: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
                     refsource: "MISC",
                     url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2019-10917",
      datePublished: "2019-05-14T19:54:48",
      dateReserved: "2019-04-08T00:00:00",
      dateUpdated: "2024-08-04T22:40:15.224Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}