CVE-2019-13929

A vulnerability has been identified in SIMATIC IT UADM (All versions < V1.3). An authenticated remote attacker with network access to port 1434/tcp of SIMATIC IT UADM could potentially recover a password that can be used to gain read and write access to the related TeamCenter station. The security vulnerability could be exploited only if the attacker is authenticated. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.
Configurations

Configuration 1 (hide)

cpe:2.3:a:siemens:simatic_it_uadm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:25

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-984700.pdf - Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-984700.pdf - Vendor Advisory

Information

Published : 2019-10-10 14:15

Updated : 2024-11-21 04:25


NVD link : CVE-2019-13929

Mitre link : CVE-2019-13929

CVE.ORG link : CVE-2019-13929


JSON object : View

Products Affected

siemens

  • simatic_it_uadm
CWE
CWE-321

Use of Hard-coded Cryptographic Key

CWE-330

Use of Insufficiently Random Values