A vulnerability has been identified in SIMATIC Automation Tool (All versions < V4 SP2), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Upd3), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC ProSave (All versions < V17), SIMATIC S7-1500 Software Controller (All versions < V21.8), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2 Update 4), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMATIC STEP 7 V5 (All versions < V5.6 SP2 HF3), SIMATIC WinCC OA V3.16 (All versions < V3.16 P018), SIMATIC WinCC OA V3.17 (All versions < V3.17 P003), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 2), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Update 4), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Update 5), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 3), SINAMICS STARTER (All Versions < V5.4 HF2), SINAMICS Startdrive (All Versions < V16 Update 3), SINEC NMS (All versions < V1.0 SP2), SINEMA Server (All versions < V14 SP3), SINUMERIK ONE virtual (All Versions < V6.14), SINUMERIK Operate (All Versions < V6.14). A common component used by the affected applications regularly calls a helper binary with SYSTEM privileges while the call path is not quoted. This could allow a local attacker to execute arbitrary code with SYTEM privileges.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-312271.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-161-04 | Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/pdf/ssa-312271.pdf | Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-20-161-04 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-312271.pdf - Vendor Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-161-04 - Third Party Advisory, US Government Resource |
Information
Published : 2020-06-10 17:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7580
Mitre link : CVE-2020-7580
CVE.ORG link : CVE-2020-7580
JSON object : View
Products Affected
siemens
- simatic_automatic_tool
- sinema_server
- simatic_pcs_neo
- simatic_pcs_7
- simatic_net_pc
- simatic_wincc
- simatic_wincc_runtime_advanced
- sinec_network_management_system
- sinumerik_operate
- simatic_prosave
- simatic_wincc_runtime_professional
- simatic_step_7
- simatic_wincc_open_architecture
- sinamics_starter_commissioning_tool
- sinumerik_one_virtual
- sinamics_startdrive
- simatic_s7-1500_software_controller
CWE
CWE-428
Unquoted Search Path or Element