Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-25910 (GCVE-0-2023-25910)
Vulnerability from cvelistv5
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SIMATIC PCS 7 |
Version: 0 < V9.1 SP2 UC04 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:32:12.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SIMATIC PCS 7", "vendor": "Siemens", "versions": [ { "lessThan": "V9.1 SP2 UC04", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-PM", "vendor": "Siemens", "versions": [ { "lessThan": "V5.7 SP1 HF1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC S7-PM", "vendor": "Siemens", "versions": [ { "lessThan": "V5.7 SP2 HF1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC STEP 7 V5", "vendor": "Siemens", "versions": [ { "lessThan": "V5.7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC PCS 7 (All versions \u003c V9.1 SP2 UC04), SIMATIC S7-PM (All versions \u003c V5.7 SP1 HF1), SIMATIC S7-PM (All versions \u003c V5.7 SP2 HF1), SIMATIC STEP 7 V5 (All versions \u003c V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server." } ], "metrics": [ { "cvssV3_1": { "baseScore": 10, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:T/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T07:23:34.211Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-25910", "datePublished": "2023-06-13T08:17:04.612Z", "dateReserved": "2023-02-16T11:12:33.500Z", "dateUpdated": "2024-08-02T11:32:12.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-25910\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2023-06-13T09:15:16.280\",\"lastModified\":\"2024-11-21T07:50:24.710\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in SIMATIC PCS 7 (All versions \u003c V9.1 SP2 UC04), SIMATIC S7-PM (All versions \u003c V5.7 SP1 HF1), SIMATIC S7-PM (All versions \u003c V5.7 SP2 HF1), SIMATIC STEP 7 V5 (All versions \u003c V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\\r\\n\\r\\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en SIMATIC PCS 7 (todas las versiones \u0026lt; V9.1 SP2 UC04), SIMATIC S7-PM (todas las versiones), SIMATIC STEP 7 V5 (todas las versiones \u0026lt; V5.7). El producto afectado contiene un sistema de gesti\u00f3n de bases de datos que podr\u00eda permitir a usuarios remotos con pocos privilegios utilizar funciones integradas de la base de datos (local o en un recurso compartido de red) que tienen impacto en el servidor. Un atacante con acceso a la red del servidor podr\u00eda aprovechar estas funciones integradas para ejecutar c\u00f3digo con privilegios elevados en el servidor del sistema de administraci\u00f3n de bases de datos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E3BDF0-B691-4A97-A74A-A65EC910480E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_s7-pm:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF831319-8E52-4A2A-9862-797DA0CB9952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.7\",\"matchCriteriaId\":\"482AD17F-916A-4DCC-8FAC-9D1716D04DD3\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-968170.html\",\"source\":\"productcert@siemens.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-968170.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Patch\",\"Vendor Advisory\"]}]}}" } }
SSA-968170
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC STEP 7 and PCS 7 contain a database management \nsystem that could allow remote users to use embedded functions of the database (local or in a network share) that have impact on the server.\n\nAn attacker with network access to the server network could leverage these embedded functions to run code in the database management system\u0027s server (where STEP 7 or PCS 7 are running).\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-968170.json" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-968170.txt" } ], "title": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products", "tracking": { "current_release_date": "2024-05-14T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-968170", "initial_release_date": "2023-06-13T00:00:00Z", "revision_history": [ { "date": "2023-06-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2023-07-11T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added a new mitigations to all affected products, adjusted summary and CVSS score" }, { "date": "2024-03-12T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added fix to SIMATIC PCS 7" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added fix to SIMATIC S7-PM" } ], "status": "interim", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V9.1 SP2 UC04", "product": { "name": "SIMATIC PCS 7", "product_id": "1" } } ], "category": "product_name", "name": "SIMATIC PCS 7" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V5.7 SP1 HF1", "product": { "name": "SIMATIC S7-PM", "product_id": "2" } }, { "category": "product_version_range", "name": "All versions \u003c V5.7 SP2 HF1", "product": { "name": "SIMATIC S7-PM", "product_id": "3" } } ], "category": "product_name", "name": "SIMATIC S7-PM" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.7", "product": { "name": "SIMATIC STEP 7 V5", "product_id": "4" } } ], "category": "product_name", "name": "SIMATIC STEP 7 V5" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-25910", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4" ] }, "remediations": [ { "category": "mitigation", "details": "If multiple Engineering Systems are in use limit remote access to port 2638/tcp to trusted systems only", "product_ids": [ "1", "2", "3", "4" ] }, { "category": "mitigation", "details": "If multiple Engineering Systems are in use ensure that the user accounts in use are restricted to the minimum required\noperating rights", "product_ids": [ "1", "2", "3", "4" ] }, { "category": "mitigation", "details": "Or switch to \"Single terminal system\" (as described in the section Workarounds and Mitigations). Alternatively, consider migrating the STEP 7 project to the latest version of TIA Portal and uninstall S7-PM", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update to V5.7 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109794088/" }, { "category": "vendor_fix", "details": "Update to V5.7 SP1 HF1 or later version", "product_ids": [ "2" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827556/" }, { "category": "vendor_fix", "details": "Update to V5.7 SP2 HF1 or later version", "product_ids": [ "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827552/" }, { "category": "vendor_fix", "details": "Update to V9.1 SP2 UC04 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812242/" }, { "category": "workaround", "details": "If only one Engineering System is in use, consider changing to \"Single terminal system\" mode in the \"Configure SIMATIC Workspace/Workstation\" application, under the \"Workstation Configuration\" tab. Restart the computer. More details can be found in the following FAQ: \nhttps://support.industry.siemens.com/cs/ww/en/view/109821340/", "product_ids": [ "1", "2", "3", "4" ] } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:T/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4" ] } ], "title": "CVE-2023-25910" } ] }
ssa-968170
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC STEP 7 and PCS 7 contain a database management \nsystem that could allow remote users to use embedded functions of the database (local or in a network share) that have impact on the server.\n\nAn attacker with network access to the server network could leverage these embedded functions to run code in the database management system\u0027s server (where STEP 7 or PCS 7 are running).\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-968170.json" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-968170.txt" } ], "title": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products", "tracking": { "current_release_date": "2024-05-14T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-968170", "initial_release_date": "2023-06-13T00:00:00Z", "revision_history": [ { "date": "2023-06-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2023-07-11T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added a new mitigations to all affected products, adjusted summary and CVSS score" }, { "date": "2024-03-12T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added fix to SIMATIC PCS 7" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added fix to SIMATIC S7-PM" } ], "status": "interim", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V9.1 SP2 UC04", "product": { "name": "SIMATIC PCS 7", "product_id": "1" } } ], "category": "product_name", "name": "SIMATIC PCS 7" }, { "branches": [ { "category": "product_version_range", "name": "All versions \u003c V5.7 SP1 HF1", "product": { "name": "SIMATIC S7-PM", "product_id": "2" } }, { "category": "product_version_range", "name": "All versions \u003c V5.7 SP2 HF1", "product": { "name": "SIMATIC S7-PM", "product_id": "3" } } ], "category": "product_name", "name": "SIMATIC S7-PM" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.7", "product": { "name": "SIMATIC STEP 7 V5", "product_id": "4" } } ], "category": "product_name", "name": "SIMATIC STEP 7 V5" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-25910", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4" ] }, "remediations": [ { "category": "mitigation", "details": "If multiple Engineering Systems are in use limit remote access to port 2638/tcp to trusted systems only", "product_ids": [ "1", "2", "3", "4" ] }, { "category": "mitigation", "details": "If multiple Engineering Systems are in use ensure that the user accounts in use are restricted to the minimum required\noperating rights", "product_ids": [ "1", "2", "3", "4" ] }, { "category": "mitigation", "details": "Or switch to \"Single terminal system\" (as described in the section Workarounds and Mitigations). Alternatively, consider migrating the STEP 7 project to the latest version of TIA Portal and uninstall S7-PM", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update to V5.7 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109794088/" }, { "category": "vendor_fix", "details": "Update to V5.7 SP1 HF1 or later version", "product_ids": [ "2" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827556/" }, { "category": "vendor_fix", "details": "Update to V5.7 SP2 HF1 or later version", "product_ids": [ "3" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827552/" }, { "category": "vendor_fix", "details": "Update to V9.1 SP2 UC04 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812242/" }, { "category": "workaround", "details": "If only one Engineering System is in use, consider changing to \"Single terminal system\" mode in the \"Configure SIMATIC Workspace/Workstation\" application, under the \"Workstation Configuration\" tab. Restart the computer. More details can be found in the following FAQ: \nhttps://support.industry.siemens.com/cs/ww/en/view/109821340/", "product_ids": [ "1", "2", "3", "4" ] } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:T/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4" ] } ], "title": "CVE-2023-25910" } ] }
cnvd-2023-48548
Vulnerability from cnvd
Title: Siemens SIMATIC STEP 7 V5远程代码执行漏洞
Description:
SIMATIC PCS 7是一个集散控制系统(DCS),集成了SIMATIC WinCC、SIMATIC Batch、SIMATIC Route control、OpenPCS 7等组件。SIMATIC S7-PM是SIMATIC STEP 7 V5.7的一个选项包,它提供了在项目范围内分配消息号的可能性。SIMATIC STEP 7 V5是SIMATIC S7-300/S7-400/C7/WinAC控制器配置和编程的经典工程软件。
Siemens SIMATIC STEP 7 V5存在远程代码执行漏洞,攻击者可利用该漏洞在数据库管理系统的服务器中以提升的特权运行代码。
Severity: 高
Patch Name: Siemens SIMATIC STEP 7 V5远程代码执行漏洞的补丁
Patch Description:
SIMATIC PCS 7是一个集散控制系统(DCS),集成了SIMATIC WinCC、SIMATIC Batch、SIMATIC Route control、OpenPCS 7等组件。SIMATIC S7-PM是SIMATIC STEP 7 V5.7的一个选项包,它提供了在项目范围内分配消息号的可能性。SIMATIC STEP 7 V5是SIMATIC S7-300/S7-400/C7/WinAC控制器配置和编程的经典工程软件。
Siemens SIMATIC STEP 7 V5存在远程代码执行漏洞,攻击者可利用该漏洞在数据库管理系统的服务器中以提升的特权运行代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://cert-portal.siemens.com/productcert/html/ssa-968170.html
Reference: https://cert-portal.siemens.com/productcert/html/ssa-968170.html
Name | ['SIEMENS SIMATIC PCS 7', 'Siemens SIMATIC STEP 7 <5.7', 'Siemens SIMATIC S7-PM'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2023-25910" } }, "description": "SIMATIC PCS 7\u662f\u4e00\u4e2a\u96c6\u6563\u63a7\u5236\u7cfb\u7edf(DCS)\uff0c\u96c6\u6210\u4e86SIMATIC WinCC\u3001SIMATIC Batch\u3001SIMATIC Route control\u3001OpenPCS 7\u7b49\u7ec4\u4ef6\u3002SIMATIC S7-PM\u662fSIMATIC STEP 7 V5.7\u7684\u4e00\u4e2a\u9009\u9879\u5305\uff0c\u5b83\u63d0\u4f9b\u4e86\u5728\u9879\u76ee\u8303\u56f4\u5185\u5206\u914d\u6d88\u606f\u53f7\u7684\u53ef\u80fd\u6027\u3002SIMATIC STEP 7 V5\u662fSIMATIC S7-300/S7-400/C7/WinAC\u63a7\u5236\u5668\u914d\u7f6e\u548c\u7f16\u7a0b\u7684\u7ecf\u5178\u5de5\u7a0b\u8f6f\u4ef6\u3002\n\nSiemens SIMATIC STEP 7 V5\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u7684\u670d\u52a1\u5668\u4e2d\u4ee5\u63d0\u5347\u7684\u7279\u6743\u8fd0\u884c\u4ee3\u7801\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://cert-portal.siemens.com/productcert/html/ssa-968170.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2023-48548", "openTime": "2023-06-14", "patchDescription": "SIMATIC PCS 7\u662f\u4e00\u4e2a\u96c6\u6563\u63a7\u5236\u7cfb\u7edf(DCS)\uff0c\u96c6\u6210\u4e86SIMATIC WinCC\u3001SIMATIC Batch\u3001SIMATIC Route control\u3001OpenPCS 7\u7b49\u7ec4\u4ef6\u3002SIMATIC S7-PM\u662fSIMATIC STEP 7 V5.7\u7684\u4e00\u4e2a\u9009\u9879\u5305\uff0c\u5b83\u63d0\u4f9b\u4e86\u5728\u9879\u76ee\u8303\u56f4\u5185\u5206\u914d\u6d88\u606f\u53f7\u7684\u53ef\u80fd\u6027\u3002SIMATIC STEP 7 V5\u662fSIMATIC S7-300/S7-400/C7/WinAC\u63a7\u5236\u5668\u914d\u7f6e\u548c\u7f16\u7a0b\u7684\u7ecf\u5178\u5de5\u7a0b\u8f6f\u4ef6\u3002\r\n\r\nSiemens SIMATIC STEP 7 V5\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u7684\u670d\u52a1\u5668\u4e2d\u4ee5\u63d0\u5347\u7684\u7279\u6743\u8fd0\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Siemens SIMATIC STEP 7 V5\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "SIEMENS SIMATIC PCS 7", "Siemens SIMATIC STEP 7 \u003c5.7", "Siemens SIMATIC S7-PM" ] }, "referenceLink": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html", "serverity": "\u9ad8", "submitTime": "2023-06-14", "title": "Siemens SIMATIC STEP 7 V5\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e" }
ICSA-23-166-08
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting this vulnerability to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC STEP 7 and PCS 7 contain a database management \nsystem that could allow remote users to use embedded functions of the database (local or in a network share) that have impact on the server.\n\nAn attacker with network access to the server network could leverage these embedded functions to run code in the database management system\u0027s server (where STEP 7 or PCS 7 are running).\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-968170.json" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-968170.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-23-166-08 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-166-08.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-166-08 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-08" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC STEP 7 and Derived Products", "tracking": { "current_release_date": "2024-05-14T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-166-08", "initial_release_date": "2023-06-13T00:00:00.000000Z", "revision_history": [ { "date": "2023-06-13T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2023-07-11T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Added a new mitigations to all affected products, adjusted summary and CVSS score" }, { "date": "2024-03-12T00:00:00.000000Z", "legacy_version": "1.2", "number": "3", "summary": "Added fix to SIMATIC PCS 7" }, { "date": "2024-05-14T00:00:00.000000Z", "legacy_version": "1.3", "number": "4", "summary": "Added fix to SIMATIC S7-PM" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV9.1_SP2_UC04", "product": { "name": "SIMATIC PCS 7", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC PCS 7" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.7_SP1_HF1", "product": { "name": "SIMATIC S7-PM", "product_id": "CSAFPID-0002" } }, { "category": "product_version_range", "name": "\u003cV5.7_SP2_HF1", "product": { "name": "SIMATIC S7-PM", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SIMATIC S7-PM" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.7", "product": { "name": "SIMATIC STEP 7 V5", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "SIMATIC STEP 7 V5" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-25910", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "mitigation", "details": "If multiple Engineering Systems are in use limit remote access to port 2638/tcp to trusted systems only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "mitigation", "details": "If multiple Engineering Systems are in use ensure that the user accounts in use are restricted to the minimum required\noperating rights", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Or switch to \"Single terminal system\" (as described in the section Workarounds and Mitigations). Alternatively, consider migrating the STEP 7 project to the latest version of TIA Portal and uninstall S7-PM", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V5.7 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109794088/" }, { "category": "vendor_fix", "details": "Update to V5.7 SP1 HF1 or later version", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827556/" }, { "category": "vendor_fix", "details": "Update to V5.7 SP2 HF1 or later version", "product_ids": [ "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827552/" }, { "category": "vendor_fix", "details": "Update to V9.1 SP2 UC04 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812242/" }, { "category": "workaround", "details": "If only one Engineering System is in use, consider changing to \"Single terminal system\" mode in the \"Configure SIMATIC Workspace/Workstation\" application, under the \"Workstation Configuration\" tab. Restart the computer. More details can be found in the following FAQ: \nhttps://support.industry.siemens.com/cs/ww/en/view/109821340/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:T/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2023-25910" } ] }
icsa-23-166-08
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting this vulnerability to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC STEP 7 and PCS 7 contain a database management \nsystem that could allow remote users to use embedded functions of the database (local or in a network share) that have impact on the server.\n\nAn attacker with network access to the server network could leverage these embedded functions to run code in the database management system\u0027s server (where STEP 7 or PCS 7 are running).\n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-968170.json" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" }, { "category": "self", "summary": "SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-968170.txt" }, { "category": "self", "summary": "ICS Advisory ICSA-23-166-08 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-166-08.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-166-08 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-08" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC STEP 7 and Derived Products", "tracking": { "current_release_date": "2024-05-14T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-166-08", "initial_release_date": "2023-06-13T00:00:00.000000Z", "revision_history": [ { "date": "2023-06-13T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2023-07-11T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Added a new mitigations to all affected products, adjusted summary and CVSS score" }, { "date": "2024-03-12T00:00:00.000000Z", "legacy_version": "1.2", "number": "3", "summary": "Added fix to SIMATIC PCS 7" }, { "date": "2024-05-14T00:00:00.000000Z", "legacy_version": "1.3", "number": "4", "summary": "Added fix to SIMATIC S7-PM" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV9.1_SP2_UC04", "product": { "name": "SIMATIC PCS 7", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC PCS 7" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.7_SP1_HF1", "product": { "name": "SIMATIC S7-PM", "product_id": "CSAFPID-0002" } }, { "category": "product_version_range", "name": "\u003cV5.7_SP2_HF1", "product": { "name": "SIMATIC S7-PM", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "SIMATIC S7-PM" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV5.7", "product": { "name": "SIMATIC STEP 7 V5", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "SIMATIC STEP 7 V5" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-25910", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "mitigation", "details": "If multiple Engineering Systems are in use limit remote access to port 2638/tcp to trusted systems only", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "mitigation", "details": "If multiple Engineering Systems are in use ensure that the user accounts in use are restricted to the minimum required\noperating rights", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Or switch to \"Single terminal system\" (as described in the section Workarounds and Mitigations). Alternatively, consider migrating the STEP 7 project to the latest version of TIA Portal and uninstall S7-PM", "product_ids": [ "CSAFPID-0002" ] }, { "category": "vendor_fix", "details": "Update to V5.7 or later version", "product_ids": [ "CSAFPID-0004" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109794088/" }, { "category": "vendor_fix", "details": "Update to V5.7 SP1 HF1 or later version", "product_ids": [ "CSAFPID-0002" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827556/" }, { "category": "vendor_fix", "details": "Update to V5.7 SP2 HF1 or later version", "product_ids": [ "CSAFPID-0003" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827552/" }, { "category": "vendor_fix", "details": "Update to V9.1 SP2 UC04 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109812242/" }, { "category": "workaround", "details": "If only one Engineering System is in use, consider changing to \"Single terminal system\" mode in the \"Configure SIMATIC Workspace/Workstation\" application, under the \"Workstation Configuration\" tab. Restart the computer. More details can be found in the following FAQ: \nhttps://support.industry.siemens.com/cs/ww/en/view/109821340/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:T/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2023-25910" } ] }
ghsa-5wm3-c83x-cqpq
Vulnerability from github
A vulnerability has been identified in SIMATIC PCS 7 (All versions), SIMATIC S7-PM (All versions), SIMATIC STEP 7 V5 (All versions < V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.
An attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system's server.
{ "affected": [], "aliases": [ "CVE-2023-25910" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-06-13T09:15:16Z", "severity": "HIGH" }, "details": "A vulnerability has been identified in SIMATIC PCS 7 (All versions), SIMATIC S7-PM (All versions), SIMATIC STEP 7 V5 (All versions \u003c V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\n\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server.", "id": "GHSA-5wm3-c83x-cqpq", "modified": "2024-03-12T12:30:45Z", "published": "2023-06-13T09:30:19Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25910" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2023-1433
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) f\u00fcr Automatisierungsanwendungen.\r\nSTEP 7 ist eine Software zur Programmierung von speicherprogrammierbaren Steuerungen (SPS) der SIMATIC-S7-Familie.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Siemens SIMATIC S7 und Siemens SIMATIC STEP 7 ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1433 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1433.json" }, { "category": "self", "summary": "WID-SEC-2023-1433 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1433" }, { "category": "external", "summary": "Siemens Security Advisory vom 2023-06-12", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" } ], "source_lang": "en-US", "title": "Siemens SIMATIC S7: Schwachstelle erm\u00f6glicht Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten", "tracking": { "current_release_date": "2023-06-12T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:52:19.618+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1433", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Siemens SIMATIC S7 PM", "product": { "name": "Siemens SIMATIC S7 PM", "product_id": "T028070", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:pm" } } }, { "category": "product_name", "name": "Siemens SIMATIC STEP 7 \u003c 5.7", "product": { "name": "Siemens SIMATIC STEP 7 \u003c 5.7", "product_id": "T019768", "product_identification_helper": { "cpe": "cpe:/a:siemens:simatic_step_7:v5.7" } } } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-25910", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Siemens SIMATIC S7 und Siemens SIMATIC STEP 7. Der Fehler besteht aufgrund einer unsachgem\u00e4\u00dfen Kontrolle der Codegenerierung. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Code mit erh\u00f6hten Rechten auf dem Server des Datenbankmanagementsystems auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T028070" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25910" } ] }
WID-SEC-W-2023-1433
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) f\u00fcr Automatisierungsanwendungen.\r\nSTEP 7 ist eine Software zur Programmierung von speicherprogrammierbaren Steuerungen (SPS) der SIMATIC-S7-Familie.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Siemens SIMATIC S7 und Siemens SIMATIC STEP 7 ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1433 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1433.json" }, { "category": "self", "summary": "WID-SEC-2023-1433 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1433" }, { "category": "external", "summary": "Siemens Security Advisory vom 2023-06-12", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" } ], "source_lang": "en-US", "title": "Siemens SIMATIC S7: Schwachstelle erm\u00f6glicht Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten", "tracking": { "current_release_date": "2023-06-12T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:52:19.618+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1433", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Siemens SIMATIC S7 PM", "product": { "name": "Siemens SIMATIC S7 PM", "product_id": "T028070", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:pm" } } }, { "category": "product_name", "name": "Siemens SIMATIC STEP 7 \u003c 5.7", "product": { "name": "Siemens SIMATIC STEP 7 \u003c 5.7", "product_id": "T019768", "product_identification_helper": { "cpe": "cpe:/a:siemens:simatic_step_7:v5.7" } } } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-25910", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Siemens SIMATIC S7 und Siemens SIMATIC STEP 7. Der Fehler besteht aufgrund einer unsachgem\u00e4\u00dfen Kontrolle der Codegenerierung. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Code mit erh\u00f6hten Rechten auf dem Server des Datenbankmanagementsystems auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T028070" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-25910" } ] }
gsd-2023-25910
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-25910", "id": "GSD-2023-25910" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-25910" ], "details": "A vulnerability has been identified in SIMATIC PCS 7 (All versions), SIMATIC S7-PM (All versions), SIMATIC STEP 7 V5 (All versions \u003c V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server.", "id": "GSD-2023-25910", "modified": "2023-12-13T01:20:40.011386Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2023-25910", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SIMATIC PCS 7", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "0", "version_value": "V9.1 SP2 UC04" } ] } }, { "product_name": "SIMATIC S7-PM", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "0", "version_value": "*" } ] } }, { "product_name": "SIMATIC STEP 7 V5", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "0", "version_value": "V5.7" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SIMATIC PCS 7 (All versions \u003c V9.1 SP2 UC04), SIMATIC S7-PM (All versions), SIMATIC STEP 7 V5 (All versions \u003c V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server." } ] }, "impact": { "cvss": [ { "baseScore": 10, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:T/RC:C", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-94", "lang": "eng", "value": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*", "matchCriteriaId": "13E3BDF0-B691-4A97-A74A-A65EC910480E", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_s7-pm:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF831319-8E52-4A2A-9862-797DA0CB9952", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*", "matchCriteriaId": "482AD17F-916A-4DCC-8FAC-9D1716D04DD3", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC PCS 7 (All versions \u003c V9.1 SP2 UC04), SIMATIC S7-PM (All versions), SIMATIC STEP 7 V5 (All versions \u003c V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SIMATIC PCS 7 (todas las versiones \u0026lt; V9.1 SP2 UC04), SIMATIC S7-PM (todas las versiones), SIMATIC STEP 7 V5 (todas las versiones \u0026lt; V5.7). El producto afectado contiene un sistema de gesti\u00f3n de bases de datos que podr\u00eda permitir a usuarios remotos con pocos privilegios utilizar funciones integradas de la base de datos (local o en un recurso compartido de red) que tienen impacto en el servidor. Un atacante con acceso a la red del servidor podr\u00eda aprovechar estas funciones integradas para ejecutar c\u00f3digo con privilegios elevados en el servidor del sistema de administraci\u00f3n de bases de datos." } ], "id": "CVE-2023-25910", "lastModified": "2024-03-12T11:15:45.877", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "productcert@siemens.com", "type": "Secondary" } ] }, "published": "2023-06-13T09:15:16.280", "references": [ { "source": "productcert@siemens.com", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" }, { "source": "productcert@siemens.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "productcert@siemens.com", "type": "Secondary" } ] } } } }
fkie_cve-2023-25910
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_pcs_7 | * | |
siemens | simatic_s7-pm | * | |
siemens | simatic_step_7 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*", "matchCriteriaId": "13E3BDF0-B691-4A97-A74A-A65EC910480E", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_s7-pm:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF831319-8E52-4A2A-9862-797DA0CB9952", "vulnerable": true }, { "criteria": "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*", "matchCriteriaId": "482AD17F-916A-4DCC-8FAC-9D1716D04DD3", "versionEndExcluding": "5.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC PCS 7 (All versions \u003c V9.1 SP2 UC04), SIMATIC S7-PM (All versions \u003c V5.7 SP1 HF1), SIMATIC S7-PM (All versions \u003c V5.7 SP2 HF1), SIMATIC STEP 7 V5 (All versions \u003c V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.\r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en SIMATIC PCS 7 (todas las versiones \u0026lt; V9.1 SP2 UC04), SIMATIC S7-PM (todas las versiones), SIMATIC STEP 7 V5 (todas las versiones \u0026lt; V5.7). El producto afectado contiene un sistema de gesti\u00f3n de bases de datos que podr\u00eda permitir a usuarios remotos con pocos privilegios utilizar funciones integradas de la base de datos (local o en un recurso compartido de red) que tienen impacto en el servidor. Un atacante con acceso a la red del servidor podr\u00eda aprovechar estas funciones integradas para ejecutar c\u00f3digo con privilegios elevados en el servidor del sistema de administraci\u00f3n de bases de datos." } ], "id": "CVE-2023-25910", "lastModified": "2024-11-21T07:50:24.710", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "productcert@siemens.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T09:15:16.280", "references": [ { "source": "productcert@siemens.com", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" }, { "source": "productcert@siemens.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" } ], "sourceIdentifier": "productcert@siemens.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "productcert@siemens.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202306-1109
Vulnerability from variot
A vulnerability has been identified in SIMATIC PCS 7 (All versions < V9.1 SP2 UC04), SIMATIC S7-PM (All versions < V5.7 SP1 HF1), SIMATIC S7-PM (All versions < V5.7 SP2 HF1), SIMATIC STEP 7 V5 (All versions < V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server.
An attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system's server
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202306-1109", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "simatic pcs 7", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic s7-pm", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic step 7", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.7" } ], "sources": [ { "db": "NVD", "id": "CVE-2023-25910" } ] }, "cve": "CVE-2023-25910", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2023-25910", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2023-25910", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2023-25910", "trust": 1.0, "value": "HIGH" }, { "author": "productcert@siemens.com", "id": "CVE-2023-25910", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202306-934", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-934" }, { "db": "NVD", "id": "CVE-2023-25910" }, { "db": "NVD", "id": "CVE-2023-25910" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in SIMATIC PCS 7 (All versions \u003c V9.1 SP2 UC04), SIMATIC S7-PM (All versions \u003c V5.7 SP1 HF1), SIMATIC S7-PM (All versions \u003c V5.7 SP2 HF1), SIMATIC STEP 7 V5 (All versions \u003c V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server. \r\n\r\nAn attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system\u0027s server", "sources": [ { "db": "NVD", "id": "CVE-2023-25910" }, { "db": "VULMON", "id": "CVE-2023-25910" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SIEMENS", "id": "SSA-968170", "trust": 1.7 }, { "db": "NVD", "id": "CVE-2023-25910", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202306-934", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2023-25910", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-25910" }, { "db": "CNNVD", "id": "CNNVD-202306-934" }, { "db": "NVD", "id": "CVE-2023-25910" } ] }, "id": "VAR-202306-1109", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.6282519 }, "last_update_date": "2024-08-14T14:49:01.993000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Siemens SIMATIC PCS 7 Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=242374" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-934" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2023-25910" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2023-25910/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-25910" }, { "db": "CNNVD", "id": "CNNVD-202306-934" }, { "db": "NVD", "id": "CVE-2023-25910" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-25910" }, { "db": "CNNVD", "id": "CNNVD-202306-934" }, { "db": "NVD", "id": "CVE-2023-25910" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-06-13T00:00:00", "db": "VULMON", "id": "CVE-2023-25910" }, { "date": "2023-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-934" }, { "date": "2023-06-13T09:15:16.280000", "db": "NVD", "id": "CVE-2023-25910" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-06-13T00:00:00", "db": "VULMON", "id": "CVE-2023-25910" }, { "date": "2023-06-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202306-934" }, { "date": "2024-05-14T16:15:28.993000", "db": "NVD", "id": "CVE-2023-25910" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-934" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SIMATIC PCS 7 Code injection vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-934" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202306-934" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.