cnvd-2021-71442
Vulnerability from cnvd
Title
Siemens Siveillance OIS操作系统命令注入漏洞
Description
Siemens Desigo CC是德国西门子(Siemens)公司的一款开放式楼宇管理平台。GMA Manager允许将不同的安全和安保系统(如火灾探测系统和视频监控)功能性地结合在一个通用平台上 。Operation Scheduler是一种使安全操作员能够智能地执行日常任务的工具。Siveillance Control是一个物理安全信息管理系统(PSIM)。Siveillance Control Pro是一种命令和控制解决方案。Siveillance Open Interface Services (OIS)是一个接口和集成平台,用于将子系统集成到管理站中。 Siemens Siveillance OIS存在操作系统命令注入漏洞,该漏洞是由于受影响的应用程序错误地中和特定HTTP GET请求中的特殊元素,未经身份验证的远程攻击者可利用此漏洞以root权限在系统上执行任意代码。
Severity
Patch Name
Siemens Siveillance OIS操作系统命令注入漏洞的补丁
Patch Description
Siemens Desigo CC是德国西门子(Siemens)公司的一款开放式楼宇管理平台。GMA Manager允许将不同的安全和安保系统(如火灾探测系统和视频监控)功能性地结合在一个通用平台上 。Operation Scheduler是一种使安全操作员能够智能地执行日常任务的工具。Siveillance Control是一个物理安全信息管理系统(PSIM)。Siveillance Control Pro是一种命令和控制解决方案。Siveillance Open Interface Services (OIS)是一个接口和集成平台,用于将子系统集成到管理站中。 Siemens Siveillance OIS存在操作系统命令注入漏洞,该漏洞是由于受影响的应用程序错误地中和特定HTTP GET请求中的特殊元素,未经身份验证的远程攻击者可利用此漏洞以root权限在系统上执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下供应商提供的安全公告获得补丁信息: https://cert-portal.siemens.com/productcert/pdf/ssa-535380.pdf

Reference
https://cert-portal.siemens.com/productcert/pdf/ssa-535380.pdf
Impacted products
Name
['Siemens Desigo CC', 'Siemens GMA-Manager', 'Siemens Operation Scheduler', 'Siemens Siveillance Control', 'Siemens Siveillance Control Pro']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2021-31891"
    }
  },
  "description": "Siemens Desigo CC\u662f\u5fb7\u56fd\u897f\u95e8\u5b50\uff08Siemens\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5f00\u653e\u5f0f\u697c\u5b87\u7ba1\u7406\u5e73\u53f0\u3002GMA Manager\u5141\u8bb8\u5c06\u4e0d\u540c\u7684\u5b89\u5168\u548c\u5b89\u4fdd\u7cfb\u7edf\uff08\u5982\u706b\u707e\u63a2\u6d4b\u7cfb\u7edf\u548c\u89c6\u9891\u76d1\u63a7\uff09\u529f\u80fd\u6027\u5730\u7ed3\u5408\u5728\u4e00\u4e2a\u901a\u7528\u5e73\u53f0\u4e0a \u3002Operation Scheduler\u662f\u4e00\u79cd\u4f7f\u5b89\u5168\u64cd\u4f5c\u5458\u80fd\u591f\u667a\u80fd\u5730\u6267\u884c\u65e5\u5e38\u4efb\u52a1\u7684\u5de5\u5177\u3002Siveillance Control\u662f\u4e00\u4e2a\u7269\u7406\u5b89\u5168\u4fe1\u606f\u7ba1\u7406\u7cfb\u7edf\uff08PSIM\uff09\u3002Siveillance Control Pro\u662f\u4e00\u79cd\u547d\u4ee4\u548c\u63a7\u5236\u89e3\u51b3\u65b9\u6848\u3002Siveillance Open Interface Services (OIS)\u662f\u4e00\u4e2a\u63a5\u53e3\u548c\u96c6\u6210\u5e73\u53f0\uff0c\u7528\u4e8e\u5c06\u5b50\u7cfb\u7edf\u96c6\u6210\u5230\u7ba1\u7406\u7ad9\u4e2d\u3002\n\nSiemens Siveillance OIS\u5b58\u5728\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u5730\u4e2d\u548c\u7279\u5b9aHTTP GET\u8bf7\u6c42\u4e2d\u7684\u7279\u6b8a\u5143\u7d20\uff0c\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u4ee5root\u6743\u9650\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-535380.pdf",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-71442",
  "openTime": "2021-09-16",
  "patchDescription": "Siemens Desigo CC\u662f\u5fb7\u56fd\u897f\u95e8\u5b50\uff08Siemens\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5f00\u653e\u5f0f\u697c\u5b87\u7ba1\u7406\u5e73\u53f0\u3002GMA Manager\u5141\u8bb8\u5c06\u4e0d\u540c\u7684\u5b89\u5168\u548c\u5b89\u4fdd\u7cfb\u7edf\uff08\u5982\u706b\u707e\u63a2\u6d4b\u7cfb\u7edf\u548c\u89c6\u9891\u76d1\u63a7\uff09\u529f\u80fd\u6027\u5730\u7ed3\u5408\u5728\u4e00\u4e2a\u901a\u7528\u5e73\u53f0\u4e0a \u3002Operation Scheduler\u662f\u4e00\u79cd\u4f7f\u5b89\u5168\u64cd\u4f5c\u5458\u80fd\u591f\u667a\u80fd\u5730\u6267\u884c\u65e5\u5e38\u4efb\u52a1\u7684\u5de5\u5177\u3002Siveillance Control\u662f\u4e00\u4e2a\u7269\u7406\u5b89\u5168\u4fe1\u606f\u7ba1\u7406\u7cfb\u7edf\uff08PSIM\uff09\u3002Siveillance Control Pro\u662f\u4e00\u79cd\u547d\u4ee4\u548c\u63a7\u5236\u89e3\u51b3\u65b9\u6848\u3002Siveillance Open Interface Services (OIS)\u662f\u4e00\u4e2a\u63a5\u53e3\u548c\u96c6\u6210\u5e73\u53f0\uff0c\u7528\u4e8e\u5c06\u5b50\u7cfb\u7edf\u96c6\u6210\u5230\u7ba1\u7406\u7ad9\u4e2d\u3002\r\n\r\nSiemens Siveillance OIS\u5b58\u5728\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u53d7\u5f71\u54cd\u7684\u5e94\u7528\u7a0b\u5e8f\u9519\u8bef\u5730\u4e2d\u548c\u7279\u5b9aHTTP GET\u8bf7\u6c42\u4e2d\u7684\u7279\u6b8a\u5143\u7d20\uff0c\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u4ee5root\u6743\u9650\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Siemens Siveillance OIS\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Siemens Desigo CC",
      "Siemens GMA-Manager",
      "Siemens Operation Scheduler",
      "Siemens Siveillance Control",
      "Siemens Siveillance Control Pro"
    ]
  },
  "referenceLink": "https://cert-portal.siemens.com/productcert/pdf/ssa-535380.pdf",
  "serverity": "\u9ad8",
  "submitTime": "2021-09-15",
  "title": "Siemens Siveillance OIS\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…