2023-10-13 20:00:27 +00:00

81 lines
2.5 KiB
JSON

{
"id": "CVE-2023-43625",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-10-10T11:15:12.323",
"lastModified": "2023-10-13T18:26:10.907",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Simcenter Amesim (All versions < V2021.1). The affected application contains a SOAP endpoint that could allow an unauthenticated remote attacker to perform DLL injection and execute arbitrary code in the context of the affected application process."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en Simcenter Amesim (Todas las versiones &lt; V2021.1). La aplicaci\u00f3n afectada contiene un endpoint SOAP que podr\u00eda permitir a un atacante remoto no autenticado realizar una inyecci\u00f3n de DLL y ejecutar c\u00f3digo arbitrario en el contexto del proceso de la aplicaci\u00f3n afectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simcenter_amesim:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2021.1",
"matchCriteriaId": "04745EBE-2AF5-47CB-BA50-153C595573DB"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-386812.pdf",
"source": "productcert@siemens.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}