CVE-2020-7593

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (V1.81.01 - V1.81.03), LOGO! 8 BM (incl. SIPLUS variants) (V1.82.01), LOGO! 8 BM (incl. SIPLUS variants) (V1.82.02). A buffer overflow vulnerability exists in the Web Server functionality of the device. A remote unauthenticated attacker could send a specially crafted HTTP request to cause a memory corruption, potentially resulting in remote code execution.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:siemens:logo\!_8_bm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:logo\!_8_bm_firmware:1.82.01:*:*:*:*:*:*:*
cpe:2.3:o:siemens:logo\!_8_bm_firmware:1.82.02:*:*:*:*:*:*:*
cpe:2.3:h:siemens:logo\!_8_bm:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-573753.pdf - Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-573753.pdf - Vendor Advisory
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1069 - Exploit, Third Party Advisory () https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1069 - Exploit, Third Party Advisory

Information

Published : 2020-07-14 14:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7593

Mitre link : CVE-2020-7593

CVE.ORG link : CVE-2020-7593


JSON object : View

Products Affected

siemens

  • logo\!_8_bm_firmware
  • logo\!_8_bm
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')