Vulnerabilites related to siemens - simatic_hmi_tp
Vulnerability from fkie_nvd
Published
2018-12-13 16:29
Modified
2024-11-21 03:48
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The webserver of affected HMI devices may allow URL redirections to untrusted websites. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AD9AEE0-437E-45C7-BA3C-696628FA6883",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BCFE761-35C9-43EF-85BC-E8083B9F75CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6D3259C-2DAF-4136-BAC3-28B234329E27",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4830E0D-0128-4E5B-AB81-2B238471AE4B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D090C01-A7A7-43C2-842F-50951D75B57A",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F106DEE3-4DED-46E4-9661-9D9C7B729BC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE04B9B4-EFFF-447D-9D98-80EE43E926E9",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D175BC55-2EAA-4D4A-9E05-2FBB228160F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B1F081F-E97A-445B-B6D5-E0AEFA3360C1",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C39166C-38CA-426F-9702-B9CA5ED6630C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7027573E-5E1E-4750-98AD-AC82DC5C1708",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29338CD-57BD-4734-9204-118EA53D42FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B26872E-A514-4CD7-98C9-2F8B6FD3DEEB",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E7858AB-F89E-4E50-8873-DE8F5F2A07CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:*:*:*:*",
                     matchCriteriaId: "775A5747-AB92-4E27-9A74-7DF5368A5BA9",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:advanced:*:*:*",
                     matchCriteriaId: "5D1FBC31-3165-4057-A615-536D73A75311",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:professional:*:*:*",
                     matchCriteriaId: "92C7789F-1646-485A-9889-5AD81B5F1105",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_tp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "983886F3-5B11-4AC3-A4D9-C2816F9A37DF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_tp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE8F082D-04C4-4A3E-B3D1-6C2914C2917E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_mp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2271FBE-FF50-4614-A4A5-BBAB800F5FBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68C30B3C-90EF-4244-9235-D87A421850DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_op_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "217870AC-9EB0-4BDE-A2E2-381055B8E69C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_op:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A17F4CDF-5367-4343-AA1E-0C452495E598",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The webserver of affected HMI devices may allow URL redirections to untrusted websites. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en SIMATIC HMI Comfort Panels 4\" - 22\" (todas las versiones anteriores a V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7\" 15\" (todas las versiones anteriores a V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 y KTP900F (todas las versiones anteriores a V15 Update 4), SIMATIC WinCC Runtime Advanced (todas las versiones anteriores a V15 Update 4), SIMATIC WinCC Runtime Professional (todas las versiones anteriores a V15 Update 4), SIMATIC WinCC (TIA Portal) (todas las versiones anteriores a V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (todas las versiones). El servidor web de los dispositivos HMI podría permitir redirecciones de URL a sitios web no fiables. Un atacante debe engañar a un usuario válido autenticado en el dispositivo para que haga clic en un enlace malicioso y explote esta vulnerabilidad. En el momento de la publicación del aviso, no se conoce ninguna explotación pública de la vulnerabilidad de seguridad.",
      },
   ],
   id: "CVE-2018-13813",
   lastModified: "2024-11-21T03:48:07.380",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-12-13T16:29:00.320",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105922",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105922",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-601",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-601",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-14 20:29
Modified
2024-11-21 04:46
Severity ?
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The affected device offered SNMP read and write capacities with a publicly know hardcoded community string. The security vulnerability could be exploited by an attacker with network access to the affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "865FD012-F390-4BB8-B14F-533840B95512",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BCFE761-35C9-43EF-85BC-E8083B9F75CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7299F88D-8885-4871-93E1-CBEFD3156B15",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4830E0D-0128-4E5B-AB81-2B238471AE4B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8EC6926-258F-4F5C-88D2-33FE363340DB",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F106DEE3-4DED-46E4-9661-9D9C7B729BC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D9CF819-E06C-4EAA-85B3-AC40E039D485",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D175BC55-2EAA-4D4A-9E05-2FBB228160F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B28FB484-526A-437E-80E3-B62F54F1BEF6",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C39166C-38CA-426F-9702-B9CA5ED6630C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "66FC2264-7DDD-4BEF-9795-AC6A5A00886B",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29338CD-57BD-4734-9204-118EA53D42FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E4F0084-91A5-4D7E-971B-9DB979849594",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E7858AB-F89E-4E50-8873-DE8F5F2A07CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:*:*:*:*",
                     matchCriteriaId: "82389DAA-8D03-4806-AF86-87A1627A972F",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:advanced:*:*:*",
                     matchCriteriaId: "C24C17B5-C379-4FD1-BA9F-38B2A329F254",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:professional:*:*:*",
                     matchCriteriaId: "24939BB3-7D99-4812-9EF8-65FE1FC9CCD8",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_tp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "983886F3-5B11-4AC3-A4D9-C2816F9A37DF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_tp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE8F082D-04C4-4A3E-B3D1-6C2914C2917E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_mp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2271FBE-FF50-4614-A4A5-BBAB800F5FBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68C30B3C-90EF-4244-9235-D87A421850DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_op_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "217870AC-9EB0-4BDE-A2E2-381055B8E69C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_op:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A17F4CDF-5367-4343-AA1E-0C452495E598",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The affected device offered SNMP read and write capacities with a publicly know hardcoded community string. The security vulnerability could be exploited by an attacker with network access to the affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
      },
      {
         lang: "es",
         value: "Ha sido identificada una vulnerabilidad en SIMATIC HMI Comfort Panels 4\" - 22\" (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 y KTP900F (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC WinCC Runtime Advanced (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC WinCC Runtime Professional (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC WinCC (TIA Portal) (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (Todas las versiones). El dispositivo afectado ofrecía capacidades de lectura y escritura de SNMP con una cadena de comunidad codificada públicamente. La vulnerabilidad de la seguridad podría ser explotada por un atacante con acceso de red al dispositivo afectado. La explotación con éxito no requiere privilegios del sistema ni interacción del usuario. Un atacante podría utilizar la vulnerabilidad para comprometer la confidencialidad y la integridad del sistema afectado. En el momento de la publicación de asesoramiento, no se conocía la explotación pública de esta vulnerabilidad de seguridad.",
      },
   ],
   id: "CVE-2019-6572",
   lastModified: "2024-11-21T04:46:43.653",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 9.1,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-14T20:29:04.200",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/108412",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/108412",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-798",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-14 20:29
Modified
2024-11-21 04:46
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify particular parts of the device configuration via SNMP. The security vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires system privileges and user interaction. An attacker could use the vulnerability to compromise confidentiality and the integrity of the affected system. At the stage of publishing this security advisory no public exploitation is known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "865FD012-F390-4BB8-B14F-533840B95512",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BCFE761-35C9-43EF-85BC-E8083B9F75CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7299F88D-8885-4871-93E1-CBEFD3156B15",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4830E0D-0128-4E5B-AB81-2B238471AE4B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8EC6926-258F-4F5C-88D2-33FE363340DB",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F106DEE3-4DED-46E4-9661-9D9C7B729BC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D9CF819-E06C-4EAA-85B3-AC40E039D485",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D175BC55-2EAA-4D4A-9E05-2FBB228160F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B28FB484-526A-437E-80E3-B62F54F1BEF6",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C39166C-38CA-426F-9702-B9CA5ED6630C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "66FC2264-7DDD-4BEF-9795-AC6A5A00886B",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29338CD-57BD-4734-9204-118EA53D42FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E4F0084-91A5-4D7E-971B-9DB979849594",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E7858AB-F89E-4E50-8873-DE8F5F2A07CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:*:*:*:*",
                     matchCriteriaId: "82389DAA-8D03-4806-AF86-87A1627A972F",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:advanced:*:*:*",
                     matchCriteriaId: "C24C17B5-C379-4FD1-BA9F-38B2A329F254",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:professional:*:*:*",
                     matchCriteriaId: "24939BB3-7D99-4812-9EF8-65FE1FC9CCD8",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_tp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "983886F3-5B11-4AC3-A4D9-C2816F9A37DF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_tp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE8F082D-04C4-4A3E-B3D1-6C2914C2917E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_mp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2271FBE-FF50-4614-A4A5-BBAB800F5FBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68C30B3C-90EF-4244-9235-D87A421850DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_op_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "217870AC-9EB0-4BDE-A2E2-381055B8E69C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_op:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A17F4CDF-5367-4343-AA1E-0C452495E598",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify particular parts of the device configuration via SNMP. The security vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires system privileges and user interaction. An attacker could use the vulnerability to compromise confidentiality and the integrity of the affected system. At the stage of publishing this security advisory no public exploitation is known.",
      },
      {
         lang: "es",
         value: "Ha sido identificada una vulnerabilidad en SIMATIC HMI Comfort Panels 4\" - 22\" (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 y KTP900F (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC WinCC Runtime Advanced (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC WinCC Runtime Professional (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC WinCC (TIA Portal) (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (Todas las versiones). El servidor web integrado podría permitir ataques de Cross-Site Scripting (XSS) si un atacante puede modificar partes particulares de la configuración del dispositivo por medio de SNMP. La vulnerabilidad de la seguridad podría ser explotada por un atacante con acceso de red al sistema afectado. La explotación con éxito requiere privilegios del sistema e interacción del usuario. Un atacante podría utilizar la vulnerabilidad para comprometer la confidencialidad y la integridad del sistema afectado. En la etapa de publicación de este aviso de seguridad no se conoce ninguna explotación pública.",
      },
   ],
   id: "CVE-2019-6577",
   lastModified: "2024-11-21T04:46:44.267",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-14T20:29:04.623",
   references: [
      {
         source: "productcert@siemens.com",
         url: "http://www.securityfocus.com/bid/108412",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
      },
      {
         source: "productcert@siemens.com",
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/108412",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-80",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-12-13 16:29
Modified
2024-11-21 03:48
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V14), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V14), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V14), SIMATIC WinCC Runtime Advanced (All versions < V14), SIMATIC WinCC Runtime Professional (All versions < V14), SIMATIC WinCC (TIA Portal) (All versions < V14), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server (port 80/tcp and port 443/tcp) of the affected devices could allow an attacker to inject HTTP headers. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E4E5DE2-34BF-4B0E-9C53-FF53255DEA72",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BCFE761-35C9-43EF-85BC-E8083B9F75CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8ED4BD65-A2BC-45DB-8465-1A5846916522",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4830E0D-0128-4E5B-AB81-2B238471AE4B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A37DC20C-7FE9-42B0-BD92-01FD2F40D2A9",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F106DEE3-4DED-46E4-9661-9D9C7B729BC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B75E3C61-A501-4B4F-98E8-E0DA53C7CD78",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D175BC55-2EAA-4D4A-9E05-2FBB228160F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2A9006B-1C42-4E97-9FDA-225974F5FD16",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C39166C-38CA-426F-9702-B9CA5ED6630C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "86A4CFE5-471A-4710-8712-66B0ECDC8214",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29338CD-57BD-4734-9204-118EA53D42FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A449791-25A0-46A0-A022-EACCAE506189",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E7858AB-F89E-4E50-8873-DE8F5F2A07CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:*:*:*:*",
                     matchCriteriaId: "09ACCC3D-B2C3-4920-9A2D-EF4D65C60505",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:advanced:*:*:*",
                     matchCriteriaId: "F4E97D44-F06E-411E-ABAA-ACFB8AABEFA3",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:professional:*:*:*",
                     matchCriteriaId: "3876E5D8-AA56-4262-B245-CD5915AF4CAD",
                     versionEndExcluding: "14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_tp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "983886F3-5B11-4AC3-A4D9-C2816F9A37DF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_tp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE8F082D-04C4-4A3E-B3D1-6C2914C2917E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_mp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2271FBE-FF50-4614-A4A5-BBAB800F5FBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68C30B3C-90EF-4244-9235-D87A421850DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_op_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "217870AC-9EB0-4BDE-A2E2-381055B8E69C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_op:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A17F4CDF-5367-4343-AA1E-0C452495E598",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V14), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V14), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V14), SIMATIC WinCC Runtime Advanced (All versions < V14), SIMATIC WinCC Runtime Professional (All versions < V14), SIMATIC WinCC (TIA Portal) (All versions < V14), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server (port 80/tcp and port 443/tcp) of the affected devices could allow an attacker to inject HTTP headers. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en SIMATIC HMI Comfort Panels 4\" - 22\", SIMATIC HMI Comfort Outdoor Panels 7\" 15\" (todas las versiones anteriores a V14 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 y KTP900F (todas las versiones anteriores a V14), SIMATIC WinCC Runtime Advanced (todas las versiones anteriores a V14), SIMATIC WinCC Runtime Professional (todas las versiones anteriores a V14), SIMATIC WinCC (TIA Portal) (todas las versiones anteriores a V14) y SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (todas las versiones). El servidor web integrado (puerto 80/tcp y puerto 443/tcp) de los dispositivos afectados podría permitir que un atacante inyecte cabeceras HTTP. Un atacante debe engañar a un usuario válido autenticado en el dispositivo para que haga clic en un enlace malicioso y explote esta vulnerabilidad. En el momento de la publicación del aviso, no se conoce ninguna explotación pública de la vulnerabilidad de seguridad.",
      },
   ],
   id: "CVE-2018-13814",
   lastModified: "2024-11-21T03:48:07.560",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-12-13T16:29:00.350",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105931",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105931",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-113",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-12-13 16:29
Modified
2024-11-21 03:48
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). A directory traversal vulnerability could allow to download arbitrary files from the device. The security vulnerability could be exploited by an attacker with network access to the integrated web server. No user interaction and no authentication is required to exploit the vulnerability. The vulnerability impacts the confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AD9AEE0-437E-45C7-BA3C-696628FA6883",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BCFE761-35C9-43EF-85BC-E8083B9F75CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6D3259C-2DAF-4136-BAC3-28B234329E27",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4830E0D-0128-4E5B-AB81-2B238471AE4B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D090C01-A7A7-43C2-842F-50951D75B57A",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F106DEE3-4DED-46E4-9661-9D9C7B729BC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE04B9B4-EFFF-447D-9D98-80EE43E926E9",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D175BC55-2EAA-4D4A-9E05-2FBB228160F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B1F081F-E97A-445B-B6D5-E0AEFA3360C1",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C39166C-38CA-426F-9702-B9CA5ED6630C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7027573E-5E1E-4750-98AD-AC82DC5C1708",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29338CD-57BD-4734-9204-118EA53D42FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B26872E-A514-4CD7-98C9-2F8B6FD3DEEB",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E7858AB-F89E-4E50-8873-DE8F5F2A07CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:*:*:*:*",
                     matchCriteriaId: "775A5747-AB92-4E27-9A74-7DF5368A5BA9",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:advanced:*:*:*",
                     matchCriteriaId: "5D1FBC31-3165-4057-A615-536D73A75311",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:professional:*:*:*",
                     matchCriteriaId: "92C7789F-1646-485A-9889-5AD81B5F1105",
                     versionEndIncluding: "15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_tp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "983886F3-5B11-4AC3-A4D9-C2816F9A37DF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_tp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE8F082D-04C4-4A3E-B3D1-6C2914C2917E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_mp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2271FBE-FF50-4614-A4A5-BBAB800F5FBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68C30B3C-90EF-4244-9235-D87A421850DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_op_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "217870AC-9EB0-4BDE-A2E2-381055B8E69C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_op:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A17F4CDF-5367-4343-AA1E-0C452495E598",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). A directory traversal vulnerability could allow to download arbitrary files from the device. The security vulnerability could be exploited by an attacker with network access to the integrated web server. No user interaction and no authentication is required to exploit the vulnerability. The vulnerability impacts the confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.",
      },
      {
         lang: "es",
         value: "Se ha identificado una vulnerabilidad en SIMATIC HMI Comfort Panels 4\" - 22\" (todas las versiones anteriores a V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7\" 15\" (todas las versiones anteriores a V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 y KTP900F (todas las versiones anteriores a V15 Update 4), SIMATIC WinCC Runtime Advanced (todas las versiones anteriores a V15 Update 4), SIMATIC WinCC Runtime Professional (todas las versiones anteriores a V15 Update 4), SIMATIC WinCC (TIA Portal) (todas las versiones anteriores a V15 Update 4) y SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (todas las versiones). Una vulnerabilidad de salto de directorio podría permitir la descarga de archivos arbitrarios desde el dispositivo. Esta vulnerabilidad de seguridad podría ser explotada por atacantes con acceso de red al servidor web integrado. No se requiere interacción o autenticación del usuario para explotar esta vulnerabilidad. La vulnerabilidad impacta la confidencialidad del dispositivo. En el momento de la publicación del aviso, no se conoce ninguna explotación pública de la vulnerabilidad de seguridad.",
      },
   ],
   id: "CVE-2018-13812",
   lastModified: "2024-11-21T03:48:07.190",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-12-13T16:29:00.290",
   references: [
      {
         source: "productcert@siemens.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105922",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/105922",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-14 20:29
Modified
2024-11-21 04:46
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). An attacker with network access to affected devices could potentially obtain a TLS session key. If the attacker is able to observe TLS traffic between a legitimate user and the device, then the attacker could decrypt the TLS traffic. The security vulnerability could be exploited by an attacker who has network access to the web interface of the device and who is able to observe TLS traffic between legitimate users and the web interface of the affected device. The vulnerability could impact the confidentiality of the communication between the affected device and a legitimate user. At the time of advisory publication no public exploitation of the security vulnerability was known.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "865FD012-F390-4BB8-B14F-533840B95512",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BCFE761-35C9-43EF-85BC-E8083B9F75CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7299F88D-8885-4871-93E1-CBEFD3156B15",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4830E0D-0128-4E5B-AB81-2B238471AE4B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8EC6926-258F-4F5C-88D2-33FE363340DB",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F106DEE3-4DED-46E4-9661-9D9C7B729BC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D9CF819-E06C-4EAA-85B3-AC40E039D485",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D175BC55-2EAA-4D4A-9E05-2FBB228160F1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B28FB484-526A-437E-80E3-B62F54F1BEF6",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C39166C-38CA-426F-9702-B9CA5ED6630C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "66FC2264-7DDD-4BEF-9795-AC6A5A00886B",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29338CD-57BD-4734-9204-118EA53D42FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E4F0084-91A5-4D7E-971B-9DB979849594",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E7858AB-F89E-4E50-8873-DE8F5F2A07CB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):*:*:*:*:*:*:*:*",
                     matchCriteriaId: "82389DAA-8D03-4806-AF86-87A1627A972F",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:advanced:*:*:*",
                     matchCriteriaId: "C24C17B5-C379-4FD1-BA9F-38B2A329F254",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:siemens:simatic_wincc_runtime:*:*:*:*:professional:*:*:*",
                     matchCriteriaId: "24939BB3-7D99-4812-9EF8-65FE1FC9CCD8",
                     versionEndExcluding: "15.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_tp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "983886F3-5B11-4AC3-A4D9-C2816F9A37DF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_tp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE8F082D-04C4-4A3E-B3D1-6C2914C2917E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_mp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2271FBE-FF50-4614-A4A5-BBAB800F5FBD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_mp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68C30B3C-90EF-4244-9235-D87A421850DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:siemens:simatic_hmi_op_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "217870AC-9EB0-4BDE-A2E2-381055B8E69C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:siemens:simatic_hmi_op:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A17F4CDF-5367-4343-AA1E-0C452495E598",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). An attacker with network access to affected devices could potentially obtain a TLS session key. If the attacker is able to observe TLS traffic between a legitimate user and the device, then the attacker could decrypt the TLS traffic. The security vulnerability could be exploited by an attacker who has network access to the web interface of the device and who is able to observe TLS traffic between legitimate users and the web interface of the affected device. The vulnerability could impact the confidentiality of the communication between the affected device and a legitimate user. At the time of advisory publication no public exploitation of the security vulnerability was known.",
      },
      {
         lang: "es",
         value: "Ha sido identificada una vulnerabilidad en SIMATIC HMI Comfort Panels 4\" - 22\" (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 y KTP900F (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC WinCC Runtime Advanced (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC WinCC Runtime Professional (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC WinCC (TIA Portal) (Todas las versiones anteriores a la V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (Todas las versiones). Un atacante con acceso de red a los dispositivos afectados podría obtener una clave de sesión TLS. Si el atacante puede observar el tráfico TLS entre un usuario legítimo y el dispositivo, entonces el atacante podría descifrar el tráfico TLS. La vulnerabilidad de la seguridad podría ser explotada por un atacante que tenga acceso de red a la interfaz web del dispositivo y que pueda observar el tráfico TLS entre usuarios legítimos y la interfaz web del dispositivo afectado. La vulnerabilidad podría afectar la confidencialidad de la comunicación entre el dispositivo afectado y un usuario legítimo. En el momento de la publicación de asesoramiento, no se conocía la explotación pública de la vulnerabilidad de seguridad.",
      },
   ],
   id: "CVE-2019-6576",
   lastModified: "2024-11-21T04:46:44.130",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-14T20:29:04.560",
   references: [
      {
         source: "productcert@siemens.com",
         url: "http://www.securityfocus.com/bid/108412",
      },
      {
         source: "productcert@siemens.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
      },
      {
         source: "productcert@siemens.com",
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/108412",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
      },
   ],
   sourceIdentifier: "productcert@siemens.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-310",
            },
         ],
         source: "productcert@siemens.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-310",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2018-13814
Vulnerability from cvelistv5
Published
2018-12-13 16:00
Modified
2024-08-05 09:14
Severity ?
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V14), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V14), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V14), SIMATIC WinCC Runtime Advanced (All versions < V14), SIMATIC WinCC Runtime Professional (All versions < V14), SIMATIC WinCC (TIA Portal) (All versions < V14), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server (port 80/tcp and port 443/tcp) of the affected devices could allow an attacker to inject HTTP headers. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Impacted products
Vendor Product Version
Siemens AG SIMATIC HMI Comfort Panels 4" - 22", SIMATIC HMI Comfort Outdoor Panels 7" & 15", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) Version: SIMATIC HMI Comfort Panels 4" - 22" : All versions < V14
Version: SIMATIC HMI Comfort Outdoor Panels 7" & 15" : All versions < V14
Version: SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V14
Version: SIMATIC WinCC Runtime Advanced : All versions < V14
Version: SIMATIC WinCC Runtime Professional : All versions < V14
Version: SIMATIC WinCC (TIA Portal) : All versions < V14
Version: SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T09:14:47.244Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "105931",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/105931",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC HMI Comfort Panels 4\" - 22\", SIMATIC HMI Comfort Outdoor Panels 7\" & 15\", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "SIMATIC HMI Comfort Panels 4\" - 22\" : All versions < V14",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" : All versions < V14",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V14",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC WinCC Runtime Advanced : All versions < V14",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC WinCC Runtime Professional : All versions < V14",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC WinCC (TIA Portal) : All versions < V14",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions",
                  },
               ],
            },
         ],
         datePublic: "2018-12-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V14), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V14), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V14), SIMATIC WinCC Runtime Advanced (All versions < V14), SIMATIC WinCC Runtime Professional (All versions < V14), SIMATIC WinCC (TIA Portal) (All versions < V14), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server (port 80/tcp and port 443/tcp) of the affected devices could allow an attacker to inject HTTP headers. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-113",
                     description: "CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-12-14T10:57:02",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               name: "105931",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/105931",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2018-13814",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SIMATIC HMI Comfort Panels 4\" - 22\", SIMATIC HMI Comfort Outdoor Panels 7\" & 15\", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "SIMATIC HMI Comfort Panels 4\" - 22\" : All versions < V14",
                                       },
                                       {
                                          version_value: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" : All versions < V14",
                                       },
                                       {
                                          version_value: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V14",
                                       },
                                       {
                                          version_value: "SIMATIC WinCC Runtime Advanced : All versions < V14",
                                       },
                                       {
                                          version_value: "SIMATIC WinCC Runtime Professional : All versions < V14",
                                       },
                                       {
                                          version_value: "SIMATIC WinCC (TIA Portal) : All versions < V14",
                                       },
                                       {
                                          version_value: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens AG",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V14), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V14), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V14), SIMATIC WinCC Runtime Advanced (All versions < V14), SIMATIC WinCC Runtime Professional (All versions < V14), SIMATIC WinCC (TIA Portal) (All versions < V14), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server (port 80/tcp and port 443/tcp) of the affected devices could allow an attacker to inject HTTP headers. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "105931",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/105931",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2018-13814",
      datePublished: "2018-12-13T16:00:00",
      dateReserved: "2018-07-10T00:00:00",
      dateUpdated: "2024-08-05T09:14:47.244Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-6572
Vulnerability from cvelistv5
Published
2019-05-14 19:54
Modified
2024-08-04 20:23
Severity ?
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The affected device offered SNMP read and write capacities with a publicly know hardcoded community string. The security vulnerability could be exploited by an attacker with network access to the affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T20:23:22.238Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
               },
               {
                  name: "108412",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108412",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC HMI Comfort Panels 4\" - 22\"",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\"",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Advanced",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal)",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The affected device offered SNMP read and write capacities with a publicly know hardcoded community string. The security vulnerability could be exploited by an attacker with network access to the affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "CWE-200: Information Exposure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-10-24T15:25:12",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
            },
            {
               name: "108412",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108412",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2019-6572",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SIMATIC HMI Comfort Panels 4\" - 22\"",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\"",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Advanced",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens AG",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The affected device offered SNMP read and write capacities with a publicly know hardcoded community string. The security vulnerability could be exploited by an attacker with network access to the affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-200: Information Exposure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
                     refsource: "MISC",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
                  },
                  {
                     name: "108412",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108412",
                  },
                  {
                     name: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
                     refsource: "MISC",
                     url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2019-6572",
      datePublished: "2019-05-14T19:54:48",
      dateReserved: "2019-01-22T00:00:00",
      dateUpdated: "2024-08-04T20:23:22.238Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-13812
Vulnerability from cvelistv5
Published
2018-12-13 16:00
Modified
2024-08-05 09:14
Severity ?
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). A directory traversal vulnerability could allow to download arbitrary files from the device. The security vulnerability could be exploited by an attacker with network access to the integrated web server. No user interaction and no authentication is required to exploit the vulnerability. The vulnerability impacts the confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Impacted products
Vendor Product Version
Siemens AG SIMATIC HMI Comfort Panels 4" - 22", SIMATIC HMI Comfort Outdoor Panels 7" & 15", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) Version: SIMATIC HMI Comfort Panels 4" - 22" : All versions < V15 Update 4
Version: SIMATIC HMI Comfort Outdoor Panels 7" & 15" : All versions < V15 Update 4
Version: SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V15 Update 4
Version: SIMATIC WinCC Runtime Advanced : All versions < V15 Update 4
Version: SIMATIC WinCC Runtime Professional : All versions < V15 Update 4
Version: SIMATIC WinCC (TIA Portal) : All versions < V15 Update 4
Version: SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T09:14:47.285Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "105922",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/105922",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC HMI Comfort Panels 4\" - 22\", SIMATIC HMI Comfort Outdoor Panels 7\" & 15\", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "SIMATIC HMI Comfort Panels 4\" - 22\" : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC WinCC Runtime Advanced : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC WinCC Runtime Professional : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC WinCC (TIA Portal) : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions",
                  },
               ],
            },
         ],
         datePublic: "2018-12-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). A directory traversal vulnerability could allow to download arbitrary files from the device. The security vulnerability could be exploited by an attacker with network access to the integrated web server. No user interaction and no authentication is required to exploit the vulnerability. The vulnerability impacts the confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-22",
                     description: "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-12-14T10:57:02",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               name: "105922",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/105922",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2018-13812",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SIMATIC HMI Comfort Panels 4\" - 22\", SIMATIC HMI Comfort Outdoor Panels 7\" & 15\", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "SIMATIC HMI Comfort Panels 4\" - 22\" : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC WinCC Runtime Advanced : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC WinCC Runtime Professional : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC WinCC (TIA Portal) : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens AG",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). A directory traversal vulnerability could allow to download arbitrary files from the device. The security vulnerability could be exploited by an attacker with network access to the integrated web server. No user interaction and no authentication is required to exploit the vulnerability. The vulnerability impacts the confidentiality of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "105922",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/105922",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2018-13812",
      datePublished: "2018-12-13T16:00:00",
      dateReserved: "2018-07-10T00:00:00",
      dateUpdated: "2024-08-05T09:14:47.285Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-6577
Vulnerability from cvelistv5
Published
2019-05-14 19:54
Modified
2024-08-04 20:23
Severity ?
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify particular parts of the device configuration via SNMP. The security vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires system privileges and user interaction. An attacker could use the vulnerability to compromise confidentiality and the integrity of the affected system. At the stage of publishing this security advisory no public exploitation is known.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T20:23:22.189Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
               },
               {
                  name: "108412",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108412",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC HMI Comfort Panels 4\" - 22\"",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\"",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Advanced",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal)",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify particular parts of the device configuration via SNMP. The security vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires system privileges and user interaction. An attacker could use the vulnerability to compromise confidentiality and the integrity of the affected system. At the stage of publishing this security advisory no public exploitation is known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-80",
                     description: "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-10-24T15:27:02",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
            },
            {
               name: "108412",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108412",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2019-6577",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SIMATIC HMI Comfort Panels 4\" - 22\"",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\"",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Advanced",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens AG",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The integrated web server could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify particular parts of the device configuration via SNMP. The security vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires system privileges and user interaction. An attacker could use the vulnerability to compromise confidentiality and the integrity of the affected system. At the stage of publishing this security advisory no public exploitation is known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
                     refsource: "MISC",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
                  },
                  {
                     name: "108412",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108412",
                  },
                  {
                     name: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
                     refsource: "MISC",
                     url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2019-6577",
      datePublished: "2019-05-14T19:54:48",
      dateReserved: "2019-01-22T00:00:00",
      dateUpdated: "2024-08-04T20:23:22.189Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-13813
Vulnerability from cvelistv5
Published
2018-12-13 16:00
Modified
2024-08-05 09:14
Severity ?
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The webserver of affected HMI devices may allow URL redirections to untrusted websites. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Impacted products
Vendor Product Version
Siemens AG SIMATIC HMI Comfort Panels 4" - 22", SIMATIC HMI Comfort Outdoor Panels 7" & 15", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) Version: SIMATIC HMI Comfort Panels 4" - 22" : All versions < V15 Update 4
Version: SIMATIC HMI Comfort Outdoor Panels 7" & 15" : All versions < V15 Update 4
Version: SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V15 Update 4
Version: SIMATIC WinCC Runtime Advanced : All versions < V15 Update 4
Version: SIMATIC WinCC Runtime Professional : All versions < V15 Update 4
Version: SIMATIC WinCC (TIA Portal) : All versions < V15 Update 4
Version: SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T09:14:47.263Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "105922",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/105922",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC HMI Comfort Panels 4\" - 22\", SIMATIC HMI Comfort Outdoor Panels 7\" & 15\", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "SIMATIC HMI Comfort Panels 4\" - 22\" : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC WinCC Runtime Advanced : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC WinCC Runtime Professional : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC WinCC (TIA Portal) : All versions < V15 Update 4",
                  },
                  {
                     status: "affected",
                     version: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions",
                  },
               ],
            },
         ],
         datePublic: "2018-12-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The webserver of affected HMI devices may allow URL redirections to untrusted websites. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-601",
                     description: "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-12-14T10:57:02",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               name: "105922",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/105922",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2018-13813",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SIMATIC HMI Comfort Panels 4\" - 22\", SIMATIC HMI Comfort Outdoor Panels 7\" & 15\", SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC Runtime Professional, SIMATIC WinCC (TIA Portal), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "SIMATIC HMI Comfort Panels 4\" - 22\" : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC WinCC Runtime Advanced : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC WinCC Runtime Professional : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC WinCC (TIA Portal) : All versions < V15 Update 4",
                                       },
                                       {
                                          version_value: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) : All versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens AG",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15 Update 4), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V15 Update 4), SIMATIC WinCC Runtime Professional (All versions < V15 Update 4), SIMATIC WinCC (TIA Portal) (All versions < V15 Update 4), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). The webserver of affected HMI devices may allow URL redirections to untrusted websites. An attacker must trick a valid user who is authenticated to the device into clicking on a malicious link to exploit the vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-601: URL Redirection to Untrusted Site ('Open Redirect')",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "105922",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/105922",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2018-13813",
      datePublished: "2018-12-13T16:00:00",
      dateReserved: "2018-07-10T00:00:00",
      dateUpdated: "2024-08-05T09:14:47.263Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-6576
Vulnerability from cvelistv5
Published
2019-05-14 19:54
Modified
2024-08-04 20:23
Severity ?
Summary
A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). An attacker with network access to affected devices could potentially obtain a TLS session key. If the attacker is able to observe TLS traffic between a legitimate user and the device, then the attacker could decrypt the TLS traffic. The security vulnerability could be exploited by an attacker who has network access to the web interface of the device and who is able to observe TLS traffic between legitimate users and the web interface of the affected device. The vulnerability could impact the confidentiality of the communication between the affected device and a legitimate user. At the time of advisory publication no public exploitation of the security vulnerability was known.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T20:23:22.141Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
               },
               {
                  name: "108412",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108412",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SIMATIC HMI Comfort Panels 4\" - 22\"",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\"",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Advanced",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC Runtime Professional",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC WinCC (TIA Portal)",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions < V15.1 Update 1",
                  },
               ],
            },
            {
               product: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
               vendor: "Siemens AG",
               versions: [
                  {
                     status: "affected",
                     version: "All versions",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). An attacker with network access to affected devices could potentially obtain a TLS session key. If the attacker is able to observe TLS traffic between a legitimate user and the device, then the attacker could decrypt the TLS traffic. The security vulnerability could be exploited by an attacker who has network access to the web interface of the device and who is able to observe TLS traffic between legitimate users and the web interface of the affected device. The vulnerability could impact the confidentiality of the communication between the affected device and a legitimate user. At the time of advisory publication no public exploitation of the security vulnerability was known.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-310",
                     description: "CWE-310: Cryptographic Issues",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-10-24T15:26:04",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
            },
            {
               name: "108412",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108412",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "productcert@siemens.com",
               ID: "CVE-2019-6576",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SIMATIC HMI Comfort Panels 4\" - 22\"",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC HMI Comfort Outdoor Panels 7\" & 15\"",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Advanced",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC Runtime Professional",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC WinCC (TIA Portal)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions < V15.1 Update 1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel)",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All versions",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Siemens AG",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability has been identified in SIMATIC HMI Comfort Panels 4\" - 22\" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). An attacker with network access to affected devices could potentially obtain a TLS session key. If the attacker is able to observe TLS traffic between a legitimate user and the device, then the attacker could decrypt the TLS traffic. The security vulnerability could be exploited by an attacker who has network access to the web interface of the device and who is able to observe TLS traffic between legitimate users and the web interface of the affected device. The vulnerability could impact the confidentiality of the communication between the affected device and a legitimate user. At the time of advisory publication no public exploitation of the security vulnerability was known.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-310: Cryptographic Issues",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
                     refsource: "MISC",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf",
                  },
                  {
                     name: "108412",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108412",
                  },
                  {
                     name: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
                     refsource: "MISC",
                     url: "https://www.us-cert.gov/ics/advisories/ICSA-19-134-09",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2019-6576",
      datePublished: "2019-05-14T19:54:48",
      dateReserved: "2019-01-22T00:00:00",
      dateUpdated: "2024-08-04T20:23:22.141Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}