cve/2020/CVE-2020-7581.md

31 lines
2.7 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-7581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7581)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Execution%20Discrete&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Execution%20Foundation&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Execution%20Process&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Intelligence&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Quality&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20RD%26L&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Notifier%20Server%20for%20Windows&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20PCS%20neo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20STEP%207%20(TIA%20Portal)%20V15&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20STEP%207%20(TIA%20Portal)%20V16&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMOCODE%20ES%20V15.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMOCODE%20ES%20V16&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Soft%20Starter%20ES%20V15.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Soft%20Starter%20ES%20V16&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element&color=brighgreen)
### Description
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. This could allow a local attacker with administrative privileges to execute code with SYSTEM level privileges.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-7581