7
CVE-2023-32735
- EPSS 0.04%
- Published 09.07.2024 12:15:09
- Last modified 21.11.2024 08:03:56
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in SIMATIC STEP 7 Safety V16 (All versions < V16 Update 7), SIMATIC STEP 7 Safety V17 (All versions < V17 Update 7), SIMATIC STEP 7 Safety V18 (All versions < V18 Update 2), SIMATIC STEP 7 V16 (All versions < V16 Update 7), SIMATIC STEP 7 V17 (All versions < V17 Update 7), SIMATIC STEP 7 V18 (All versions < V18 Update 2), SIMATIC WinCC Unified V16 (All versions < V16 Update 7), SIMATIC WinCC Unified V17 (All versions < V17 Update 7), SIMATIC WinCC Unified V18 (All versions < V18 Update 2), SIMATIC WinCC V16 (All versions < V16.7), SIMATIC WinCC V17 (All versions < V17.7), SIMATIC WinCC V18 (All versions < V18 Update 2), SIMOCODE ES V16 (All versions < V16 Update 7), SIMOCODE ES V17 (All versions < V17 Update 7), SIMOCODE ES V18 (All versions < V18 Update 2), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SIRIUS Safety ES V17 (All versions < V17 Update 7), SIRIUS Safety ES V18 (All versions < V18 Update 2), SIRIUS Soft Starter ES V17 (All versions < V17 Update 7), SIRIUS Soft Starter ES V18 (All versions < V18 Update 2), Soft Starter ES V16 (All versions < V16 Update 7), TIA Portal Cloud V3.0 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing hardware configuration profiles. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorsiemens
≫
Product
simatic_step_7_safety
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_step_7_safety
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_step_7_safety
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_step_7
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_step_7
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_step_7
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_wincc_unified
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_wincc_unified
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_wincc_unified
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_wincc
Default Statusunknown
Version <
v17.7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simatic_wincc
Default Statusunknown
Version <
v17.7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simocode_es
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simocode_es
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simocode_es
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
simotion_scout_tia
Default Statusunknown
Version
v5.4sp1
Status
affected
Vendorsiemens
≫
Product
simotion_scout_tia
Default Statusunknown
Version
v5.4sp3
Status
affected
Vendorsiemens
≫
Product
simotion_scout_tia
Default Statusunknown
Version
v5.5sp1
Status
affected
Vendorsiemens
≫
Product
sinamics_startdrive
Default Statusunknown
Version
v17
Status
affected
Vendorsiemens
≫
Product
sinamics_startdrive
Default Statusunknown
Version
v18
Status
affected
Vendorsiemens
≫
Product
sirius_safety_es
Default Statusunknown
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
sirius_safety_es
Default Statusunknown
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
sirius_soft_starter_es
Default Statusunknown
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
sirius_soft_starter_es
Default Statusunknown
Version <
v17update7
Version
0
Status
affected
Version <
v18update2
Version
0
Status
affected
Vendorsiemens
≫
Product
soft_starter_es
Default Statusunknown
Version <
v16update7
Version
0
Status
affected
Vendorsiemens
≫
Product
tia_portal_cloud_v3.0
Default Statusunknown
Version <
v18update2
Version
0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.117 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
productcert@siemens.com | 7 | 0 | 0 |
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
productcert@siemens.com | 6.5 | 0.6 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.