Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2024-1572
Vulnerability from csaf_certbund
Published
2024-07-09 22:00
Modified
2024-07-09 22:00
Summary
Siemens TIA Portal: Mehrere Schwachstellen ermöglichen Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
TIA-Portal ist ein Automatisierungsframework für Steuerungen und andere Automatisierungsgeräte der SIMATIC-Serie.
Angriff
Ein entfernter anonymer oder lokal privilegierter Angreifer kann mehrere Schwachstellen in Siemens TIA Portal ausnutzen, um beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Sonstiges
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "TIA-Portal ist ein Automatisierungsframework f\u00fcr Steuerungen und andere Automatisierungsger\u00e4te der SIMATIC-Serie.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder lokal privilegierter Angreifer kann mehrere Schwachstellen in Siemens TIA Portal ausnutzen, um beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1572 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1572.json" }, { "category": "self", "summary": "WID-SEC-2024-1572 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1572" }, { "category": "external", "summary": "Siemens Security Advisory SSA-313039 V1.0 vom 2024-07-09", "url": "https://cert-portal.siemens.com/productcert/html/ssa-313039.html" }, { "category": "external", "summary": "Siemens Security Advisory SSA-779936 V1.0 vom 2024-07-09", "url": "https://cert-portal.siemens.com/productcert/html/ssa-779936.html" }, { "category": "external", "summary": "Siemens Security Advisory SSA-825651 V1.0 vom 2024-07-09", "url": "https://cert-portal.siemens.com/productcert/html/ssa-825651.html" } ], "source_lang": "en-US", "title": "Siemens TIA Portal: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-07-09T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:11:07.169+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1572", "initial_release_date": "2024-07-09T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c18 Update 2", "product": { "name": "Siemens TIA Portal \u003c18 Update 2", "product_id": "T035936" } }, { "category": "product_version_range", "name": "\u003c17 Update 7", "product": { "name": "Siemens TIA Portal \u003c17 Update 7", "product_id": "T035937" } } ], "category": "product_name", "name": "TIA Portal" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-45147", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Siemens TIA Portal aufgrund einer unsachgem\u00e4\u00dfen Einschr\u00e4nkung des .NET BinaryFormatter bei der Deserialisierung von benutzergesteuerten Eingaben, die zu einer Typverwechslung f\u00fchrt. Ein entfernter, anonymer oder ein lokal privilegierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "release_date": "2024-07-09T22:00:00.000+00:00", "title": "CVE-2022-45147" }, { "cve": "CVE-2023-32735", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Siemens TIA Portal aufgrund einer unsachgem\u00e4\u00dfen Einschr\u00e4nkung des .NET BinaryFormatter bei der Deserialisierung von benutzergesteuerten Eingaben, die zu einer Typverwechslung f\u00fchrt. Ein entfernter, anonymer oder ein lokal privilegierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "release_date": "2024-07-09T22:00:00.000+00:00", "title": "CVE-2023-32735" }, { "cve": "CVE-2023-32737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Siemens TIA Portal aufgrund einer unsachgem\u00e4\u00dfen Einschr\u00e4nkung des .NET BinaryFormatter bei der Deserialisierung von benutzergesteuerten Eingaben, die zu einer Typverwechslung f\u00fchrt. Ein entfernter, anonymer oder ein lokal privilegierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "release_date": "2024-07-09T22:00:00.000+00:00", "title": "CVE-2023-32737" } ] }
cve-2023-32735
Vulnerability from cvelistv5
Published
2024-07-09 12:04
Modified
2024-08-02 15:25
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in SIMATIC STEP 7 Safety V16 (All versions < V16 Update 7), SIMATIC STEP 7 Safety V17 (All versions < V17 Update 7), SIMATIC STEP 7 Safety V18 (All versions < V18 Update 2), SIMATIC STEP 7 V16 (All versions < V16 Update 7), SIMATIC STEP 7 V17 (All versions < V17 Update 7), SIMATIC STEP 7 V18 (All versions < V18 Update 2), SIMATIC WinCC Unified V16 (All versions < V16 Update 7), SIMATIC WinCC Unified V17 (All versions < V17 Update 7), SIMATIC WinCC Unified V18 (All versions < V18 Update 2), SIMATIC WinCC V16 (All versions < V16.7), SIMATIC WinCC V17 (All versions < V17.7), SIMATIC WinCC V18 (All versions < V18 Update 2), SIMOCODE ES V16 (All versions < V16 Update 7), SIMOCODE ES V17 (All versions < V17 Update 7), SIMOCODE ES V18 (All versions < V18 Update 2), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SIRIUS Safety ES V17 (All versions < V17 Update 7), SIRIUS Safety ES V18 (All versions < V18 Update 2), SIRIUS Soft Starter ES V17 (All versions < V17 Update 7), SIRIUS Soft Starter ES V18 (All versions < V18 Update 2), Soft Starter ES V16 (All versions < V16 Update 7), TIA Portal Cloud V3.0 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing hardware configuration profiles. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.
This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:siemens:simatic_step_7_safety:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simatic_step_7_safety", "vendor": "siemens", "versions": [ { "lessThan": "v16update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v17update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v18update2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simatic_step_7", "vendor": "siemens", "versions": [ { "lessThan": "v16update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v17update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v18update2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:simatic_wincc_unified:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simatic_wincc_unified", "vendor": "siemens", "versions": [ { "lessThan": "v16update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v17update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v18update2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simatic_wincc", "vendor": "siemens", "versions": [ { "lessThan": "v17.7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v18update2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simocode_es", "vendor": "siemens", "versions": [ { "lessThan": "v16update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v17update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v18update2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:simotion_scout_tia:v5.4sp1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simotion_scout_tia", "vendor": "siemens", "versions": [ { "status": "affected", "version": "v5.4sp1" } ] }, { "cpes": [ "cpe:2.3:a:siemens:simotion_scout_tia:v5.4sp3:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simotion_scout_tia", "vendor": "siemens", "versions": [ { "status": "affected", "version": "v5.4sp3" } ] }, { "cpes": [ "cpe:2.3:a:siemens:simotion_scout_tia:v5.5sp1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simotion_scout_tia", "vendor": "siemens", "versions": [ { "status": "affected", "version": "v5.5sp1" } ] }, { "cpes": [ "cpe:2.3:a:siemens:sinamics_startdrive:v17:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sinamics_startdrive", "vendor": "siemens", "versions": [ { "status": "affected", "version": "v17" } ] }, { "cpes": [ "cpe:2.3:a:siemens:sinamics_startdrive:v18:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sinamics_startdrive", "vendor": "siemens", "versions": [ { "status": "affected", "version": "v18" } ] }, { "cpes": [ "cpe:2.3:a:siemens:sirius_safety_es:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sirius_safety_es", "vendor": "siemens", "versions": [ { "lessThan": "v17update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v18update2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:sirius_soft_starter_es:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "sirius_soft_starter_es", "vendor": "siemens", "versions": [ { "lessThan": "v17update7", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "v18update2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:soft_starter_es:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "soft_starter_es", "vendor": "siemens", "versions": [ { "lessThan": "v16update7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:siemens:tia_portal_cloud_v3.0:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tia_portal_cloud_v3.0", "vendor": "siemens", "versions": [ { "lessThan": "v18update2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32735", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T19:09:33.343230Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-10T21:03:01.011Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-779936.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 Safety V16", "vendor": "Siemens", "versions": [ { "lessThan": "V16 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 Safety V17", "vendor": "Siemens", "versions": [ { "lessThan": "V17 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 Safety V18", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 V16", "vendor": "Siemens", "versions": [ { "lessThan": "V16 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 V17", "vendor": "Siemens", "versions": [ { "lessThan": "V17 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 V18", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC Unified V16", "vendor": "Siemens", "versions": [ { "lessThan": "V16 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC Unified V17", "vendor": "Siemens", "versions": [ { "lessThan": "V17 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC Unified V18", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V16", "vendor": "Siemens", "versions": [ { "lessThan": "V16.7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V17", "vendor": "Siemens", "versions": [ { "lessThan": "V17.7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC WinCC V18", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMOCODE ES V16", "vendor": "Siemens", "versions": [ { "lessThan": "V16 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMOCODE ES V17", "vendor": "Siemens", "versions": [ { "lessThan": "V17 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMOCODE ES V18", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION SCOUT TIA V5.4 SP1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION SCOUT TIA V5.4 SP3", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMOTION SCOUT TIA V5.5 SP1", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SINAMICS Startdrive V16", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SINAMICS Startdrive V17", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SINAMICS Startdrive V18", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIRIUS Safety ES V17", "vendor": "Siemens", "versions": [ { "lessThan": "V17 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIRIUS Safety ES V18", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIRIUS Soft Starter ES V17", "vendor": "Siemens", "versions": [ { "lessThan": "V17 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIRIUS Soft Starter ES V18", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Soft Starter ES V16", "vendor": "Siemens", "versions": [ { "lessThan": "V16 Update 7", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "TIA Portal Cloud V3.0", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC STEP 7 Safety V16 (All versions \u003c V16 Update 7), SIMATIC STEP 7 Safety V17 (All versions \u003c V17 Update 7), SIMATIC STEP 7 Safety V18 (All versions \u003c V18 Update 2), SIMATIC STEP 7 V16 (All versions \u003c V16 Update 7), SIMATIC STEP 7 V17 (All versions \u003c V17 Update 7), SIMATIC STEP 7 V18 (All versions \u003c V18 Update 2), SIMATIC WinCC Unified V16 (All versions \u003c V16 Update 7), SIMATIC WinCC Unified V17 (All versions \u003c V17 Update 7), SIMATIC WinCC Unified V18 (All versions \u003c V18 Update 2), SIMATIC WinCC V16 (All versions \u003c V16.7), SIMATIC WinCC V17 (All versions \u003c V17.7), SIMATIC WinCC V18 (All versions \u003c V18 Update 2), SIMOCODE ES V16 (All versions \u003c V16 Update 7), SIMOCODE ES V17 (All versions \u003c V17 Update 7), SIMOCODE ES V18 (All versions \u003c V18 Update 2), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SIRIUS Safety ES V17 (All versions \u003c V17 Update 7), SIRIUS Safety ES V18 (All versions \u003c V18 Update 2), SIRIUS Soft Starter ES V17 (All versions \u003c V17 Update 7), SIRIUS Soft Starter ES V18 (All versions \u003c V18 Update 2), Soft Starter ES V16 (All versions \u003c V16 Update 7), TIA Portal Cloud V3.0 (All versions \u003c V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing hardware configuration profiles. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.\r\n\r\nThis is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502: Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T12:04:26.871Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-779936.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-32735", "datePublished": "2024-07-09T12:04:26.871Z", "dateReserved": "2023-05-12T13:16:47.721Z", "dateUpdated": "2024-08-02T15:25:36.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45147
Vulnerability from cvelistv5
Published
2024-07-09 12:04
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing user-controllable input. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.
This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SIMATIC PCS neo V4.0 |
Version: 0 < * |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:siemens:simatic_pcs_neo:4.0:-:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simatic_pcs_neo", "vendor": "siemens", "versions": [ { "lessThan": "5.0", "status": "affected", "version": "4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:siemens:simatic_step_7:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simatic_step_7", "vendor": "siemens", "versions": [ { "lessThan": "17", "status": "affected", "version": "16", "versionType": "custom" }, { "lessThan": "18", "status": "affected", "version": "17", "versionType": "custom" }, { "lessThan": "18_update_2", "status": "affected", "version": "18", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-45147", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T13:30:52.115552Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-10T16:29:21.700Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:56.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-825651.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SIMATIC PCS neo V4.0", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 V16", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 V17", "vendor": "Siemens", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 V18", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions \u003c V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing user-controllable input. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.\r\n\r\nThis is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502: Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T12:04:22.545Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-825651.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2022-45147", "datePublished": "2024-07-09T12:04:22.545Z", "dateReserved": "2022-11-11T08:33:16.611Z", "dateUpdated": "2024-08-03T14:09:56.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32737
Vulnerability from cvelistv5
Published
2024-07-09 12:04
Modified
2024-08-02 15:25
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in SIMATIC STEP 7 Safety V18 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing user-controllable input. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.
This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Siemens | SIMATIC STEP 7 Safety V18 |
Version: 0 < V18 Update 2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "simatic_step_7", "vendor": "siemens", "versions": [ { "lessThan": "18", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-32737", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T13:30:19.087742Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-09T13:35:36.017Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-313039.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 Safety V18", "vendor": "Siemens", "versions": [ { "lessThan": "V18 Update 2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC STEP 7 Safety V18 (All versions \u003c V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing user-controllable input. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.\r\n\r\nThis is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV4_0": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502: Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T12:04:28.195Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-313039.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-32737", "datePublished": "2024-07-09T12:04:28.195Z", "dateReserved": "2023-05-12T13:16:47.721Z", "dateUpdated": "2024-08-02T15:25:36.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.