7.2
CVE-2020-7580
- EPSS 0.05%
- Veröffentlicht 10.06.2020 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:37:24
- Quelle productcert@siemens.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability has been identified in SIMATIC Automation Tool (All versions < V4 SP2), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions < V17), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC STEP 7 V5 (All versions < V5.6 SP2 HF3), SIMATIC WinCC OA V3.16 (All versions < V3.16 P018), SIMATIC WinCC OA V3.17 (All versions < V3.17 P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions < V1.0 SP2), SINEMA Server (All versions < V14 SP3), SINUMERIK ONE virtual (All Versions < V6.14), SINUMERIK Operate (All Versions < V6.14). A common component used by the affected applications regularly calls a helper binary with SYSTEM privileges while the call path is not quoted. This could allow a local attacker to execute arbitrary code with SYTEM privileges.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Siemens ≫ Simatic Net Pc Version < 16
Siemens ≫ Simatic Net Pc Version16 Update-
Siemens ≫ Simatic Net Pc Version16 Updateupdate1
Siemens ≫ Simatic S7-1500 Software Controller Version < 21.8
Siemens ≫ Simatic Step 7 Version < 5.6
Siemens ≫ Simatic Step 7 Version >= 13 <= 16
Siemens ≫ Simatic Step 7 Version5.6 Update-
Siemens ≫ Simatic Step 7 Version5.6 Updatesp1
Siemens ≫ Simatic Step 7 Version5.6 Updatesp2
Siemens ≫ Simatic Step 7 Version5.6 Updatesp2_hotfix1
Siemens ≫ Simatic Wincc Version < 7.4
Siemens ≫ Simatic Wincc Version7.4 Update-
Siemens ≫ Simatic Wincc Version7.4 Updatesp1
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update1
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update10
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update11
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update12
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update13
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update2
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update3
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update4
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update5
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update6
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update7
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update8
Siemens ≫ Simatic Wincc Version7.4 Updatesp1_update9
Siemens ≫ Simatic Wincc Version7.5 Update-
Siemens ≫ Simatic Wincc Version7.5 Updatesp1
Siemens ≫ Simatic Wincc Version7.5 Updatesp1_update1
Siemens ≫ Simatic Wincc Version7.5 Updatesp1_update2
Siemens ≫ Simatic Wincc Open Architecture Version3.16
Siemens ≫ Simatic Wincc Open Architecture Version3.17
Siemens ≫ Simatic Wincc Runtime Professional Version >= 13 <= 16
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.151 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-428 Unquoted Search Path or Element
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.