{"id": "CVE-2019-10943", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2019-08-13T19:15:15.530", "references": [{"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf", "tags": ["Vendor Advisory"], "source": "productcert@siemens.com"}, {"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "productcert@siemens.com", "description": [{"lang": "en", "value": "CWE-353"}]}, {"type": "Secondary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-345"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been identified in SIMATIC Drive Controller family (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V20.8), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions >= V20.8), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.4.0), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.4.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.8.1), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.8.1), SIMATIC S7-1500 Software Controller (All versions < V20.8), SIMATIC S7-1500 Software Controller (All versions >= V20.8), SIMATIC S7-PLCSIM Advanced (All versions < V3.0), SIMATIC S7-PLCSIM Advanced (All versions >= V3.0). An attacker with network access to port 102/tcp could potentially modify the user program on the PLC in a way that the running code is different from the source code which is stored on the device. An attacker must have network access to affected devices and must be able to perform changes to the user program. The vulnerability could impact the perceived integrity of the user program stored on the CPU. An engineer that tries to obtain the code of the user program running on the device, can receive different source code that is not actually running on the device."}, {"lang": "es", "value": "SIPLUS) (Todas las versiones anteriores a V20.8), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. variantes SIPLUS) (Todas las versiones posteriores o iguales V20.8), familia de CPUs SIMATIC S7-1200 (incl. variantes SIPLUS) (Todas las versiones anteriores a V4.4.0), familia de CPUs SIMATIC S7-1200 (incl. variantes SIPLUS) (Todas las versiones variantes SIPLUS) (Todas las versiones posteriores o iguales V4.4.0), familia de CPUs SIMATIC S7-1500 (incl. CPUs ET200 relacionadas y variantes SIPLUS) (Todas las versiones anteriores a V2.8.1), familia de CPUs SIMATIC S7-1500 (incl. CPUs ET200 relacionadas y variantes SIPLUS) (Todas las versiones posteriores o iguales V2. 8.1), SIMATIC S7-1500 Software Controller (Todas las versiones anteriores a V20.8), SIMATIC S7-1500 Software Controller (Todas las versiones posteriores o iguales V20.8), SIMATIC S7-PLCSIM Advanced (Todas las versiones anteriores a V3.0), SIMATIC S7-PLCSIM Advanced (Todas las versiones posteriores o iguales V3.0). Un atacante con acceso de red al puerto 102/tcp podr\u00eda modificar potencialmente el programa de usuario en el PLC de manera que el c\u00f3digo en ejecuci\u00f3n sea diferente del c\u00f3digo fuente que est\u00e1 almacenado en el dispositivo. Un atacante debe tener acceso de red a los dispositivos afectados y debe ser capaz de realizar cambios en el programa de usuario. La vulnerabilidad podr\u00eda afectar a la integridad percibida del programa de usuario almacenado en la CPU. Un ingeniero que intente obtener el c\u00f3digo del programa de usuario que se ejecuta en el dispositivo, puede recibir un c\u00f3digo fuente diferente que no se est\u00e1 ejecutando realmente en el dispositivo"}], "lastModified": "2024-11-21T04:20:12.313", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFA8109D-F938-4FE3-9885-831D2D0FE058"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E8AED132-C4CF-4C2E-B826-DFAE745256FD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B4A8C4A-8AED-42A4-BF49-C1F9E9A48EBD", "versionEndExcluding": "20.8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_et_200sp_open_controller_cpu_1515sp_pc2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "30E3491F-8F4A-4C7D-960D-073AA41DB4D6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1211c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0812843-6B21-4622-8C97-D87162987434", "versionEndExcluding": "4.4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1211c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3871C0C9-C65E-4E0B-9CA8-75E60066297F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEBF07D2-1CFB-4769-8F4D-59737D782B9B", "versionEndExcluding": "4.4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "07849777-92E7-41D2-9128-F8D20DE15391"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99C1E616-6A34-4C85-927B-29C53A0BA873", "versionEndExcluding": "4.4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE17584A-BF7A-48B8-A9CB-477663766C63"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB22A001-A28B-48D2-93BE-95C3EBD39A8D", "versionEndExcluding": "4.4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CC4698CF-F935-4707-BA91-7E3650C7956C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1217c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CFDEA0C-BE3D-425B-B5FD-299C93C70CD8", "versionEndExcluding": "4.4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1217c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "232279DE-CF1C-4A3C-886D-B4CE3F104F09"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85BF9FC3-FF9D-4E14-8D3F-A7AA9CC84A48", "versionEndExcluding": "2.8.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BE0BA68C-EB57-49CE-94A8-E7905AB79824"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E18897A5-B757-412B-A28A-E8BD9CA73520", "versionEndExcluding": "2.8.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "822894D4-96D5-4BDC-A698-D31262BCF422"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87628F0C-73A3-4169-A58E-18538AD88C8C", "versionEndExcluding": "2.8.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D2E24A4C-AC13-4382-BDF6-E13878FED4DC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D31E1129-2A71-4130-A32B-0E5A437D4C07", "versionEndExcluding": "20.8"}, {"criteria": "cpe:2.3:a:siemens:simatic_s7_plcsim_advanced:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCB3DDD9-64F2-4A38-A9E8-2D8AA09F403D", "versionEndExcluding": "3.0"}], "operator": "OR"}]}], "sourceIdentifier": "productcert@siemens.com"}