René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

179 lines
5.9 KiB
JSON

{
"id": "CVE-2021-37172",
"sourceIdentifier": "productcert@siemens.com",
"published": "2021-08-10T11:15:09.280",
"lastModified": "2022-07-01T17:44:35.163",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (V4.5.0). Affected devices fail to authenticate against configured passwords when provisioned using TIA Portal V13. This could allow an attacker using TIA Portal V13 or later versions to bypass authentication and download arbitrary programs to the PLC. The vulnerability does not occur when TIA Portal V13 SP1 or any later version was used to provision the device."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en la familia de CPUs SIMATIC S7-1200 (Incluyendo las variantes SIPLUS) (V4.5.0). Los dispositivos afectados no se autentican con las contrase\u00f1as configuradas cuando se aprovisionan con TIA Portal V13. Esto podr\u00eda permitir a un atacante que utilice TIA Portal V13 o versiones posteriores eludir la autenticaci\u00f3n y descargar programas arbitrarios en el PLC. La vulnerabilidad no se produce cuando se utiliza TIA Portal V13 SP1 o cualquier versi\u00f3n posterior para aprovisionar el dispositivo"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:simatic_s7-1200_cpu_firmware:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F6394ED6-C200-4673-882B-7FC2A4C89C42"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cpu_1211c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "172D341B-D863-4C24-9B6E-633EBE87C8C9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cpu_1212c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B475E4F-EE4F-4435-9F0B-8E4FA35377BE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cpu_1212fc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1402D624-5AF3-4E25-A2B0-9D9F214EE8FE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cpu_1214c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F714315-8BEB-4BD3-BE59-C6649A0A105E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cpu_1214fc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A988C9F-60DF-4BC5-A890-F03F445DD9BD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cpu_1215c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C90820D3-3F3E-4DC4-9DCE-A498CC26268D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cpu_1215fc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAF22AB6-6DAA-4983-99DB-4F2A2E76856F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:cpu_1217c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C95F12D-563A-4915-9F26-A461EB4F8FA1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:simatic_step_7_\\(tia_portal\\):*:*:*:*:*:*:*:*",
"versionEndIncluding": "13.0",
"matchCriteriaId": "8EA4509B-FC68-42FC-9CB6-ED3C3E65E153"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-830194.pdf",
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}