2024-12-15 03:03:56 +00:00

187 lines
7.9 KiB
JSON

{
"id": "CVE-2020-7581",
"sourceIdentifier": "productcert@siemens.com",
"published": "2020-07-14T14:15:18.587",
"lastModified": "2024-11-21T05:37:24.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. This could allow a local attacker with administrative privileges to execute code with SYSTEM level privileges."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en Opcenter Execution Discrete (Todas las versiones anteriores a V3.2), Opcenter Execution Foundation (Todas las versiones anteriores a V3.2), Opcenter Execution Process (Todas las versiones anteriores a V3.2), Opcenter Intelligence (Todas las versiones anteriores a V3.3), Opcenter Quality (Todas las versiones anteriores a V11.3), Opcenter RD&amp;L (V8.0), SIMATIC Notifier Server for Windows (Todas las versiones), SIMATIC PCS neo (Todas las versiones anteriores a V3. 0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (Todas las versiones anteriores a V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (Todas las versiones anteriores a V16 Update 2), SIMOCODE ES V15.1 (Todas las versiones anteriores a V15.1 Update 4), SIMOCODE ES V16 (Todas las versiones anteriores a V16 Update 1), Soft Starter ES V15.1 (Todas las versiones anteriores a V15.1 Update 3), Soft Starter ES V16 (Todas las versiones anteriores a V16 Update 1). Un componente dentro de la aplicaci\u00f3n afectada llama a un binario de ayuda con privilegios de SISTEMA durante el inicio mientras la ruta de llamada no est\u00e1 citada. Esto podr\u00eda permitir a un atacante local con privilegios administrativos ejecutar c\u00f3digo con privilegios de nivel SYSTEM"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 7.2,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:opcenter_execution_discrete:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2",
"matchCriteriaId": "F33BF89C-F36E-4C8F-ABB9-579E2022DDA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:opcenter_execution_foundation:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2",
"matchCriteriaId": "1DCE5E06-B75F-4D21-96CC-70DD373B1811"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:opcenter_execution_process:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2",
"matchCriteriaId": "C4DD5C57-5877-495C-A01E-747E5DCED9F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9BAFAE-C26A-4435-80C1-508F0A3EF768"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.3",
"matchCriteriaId": "9DB2F53B-817C-41F3-9B52-85DE702ACCE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:opcenter_rd\\&l:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE037602-C9E8-45D5-9A44-3B73052F478E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_notifier_server:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "DE74021F-CE57-42CC-8093-E1B0352410FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D61D4B81-7F51-49BE-83DD-D2C28D23B0EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16",
"matchCriteriaId": "E6D968D9-2A64-4E1C-824F-6508AEC6789D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_step_7:16:-:*:*:*:*:*:*",
"matchCriteriaId": "66CB66B9-176E-4FA3-BC67-E7C5972A307C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_step_7:16:update1:*:*:*:*:*:*",
"matchCriteriaId": "EF2D6947-576B-4CA7-B4E4-F0B428FA5ABB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE934FDC-666F-4D9D-9C03-2896875F0A0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:soft_starter_es:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA57190F-97BA-4D1D-BC73-F37162B775F9"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-841348.pdf",
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-841348.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}