Lucene search

K
cve[email protected]CVE-2020-7581
HistoryJul 14, 2020 - 2:15 p.m.

CVE-2020-7581

2020-07-1414:15:18
CWE-428
web.nvd.nist.gov
36
2
vulnerability
siemens
opcenter
execution discrete
execution foundation
execution process
intelligence
quality
simatic
notifier server
pcs neo
step 7
tia portal
simocode es
soft starter es

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. This could allow a local attacker with administrative privileges to execute code with SYSTEM level privileges.

Affected configurations

NVD
Node
siemensopcenter_execution_discreteRange<3.2
OR
siemensopcenter_execution_foundationRange<3.2
OR
siemensopcenter_execution_processRange<3.2
OR
siemensopcenter_intelligence
OR
siemensopcenter_qualityRange<11.3
OR
siemensopcenter_rd\&lMatch8.0
OR
siemenssimatic_notifier_serverwindows
OR
siemenssimatic_pcs_neo
OR
siemenssimatic_step_7Range<16
OR
siemenssimatic_step_7Match16-
OR
siemenssimatic_step_7Match16update1
OR
siemenssimocode_es
OR
siemenssoft_starter_es

CNA Affected

[
  {
    "product": "Opcenter Execution Discrete",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V3.2"
      }
    ]
  },
  {
    "product": "Opcenter Execution Foundation",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V3.2"
      }
    ]
  },
  {
    "product": "Opcenter Execution Process",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V3.2"
      }
    ]
  },
  {
    "product": "Opcenter Intelligence",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V3.3"
      }
    ]
  },
  {
    "product": "Opcenter Quality",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V11.3"
      }
    ]
  },
  {
    "product": "Opcenter RD&L",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "V8.0"
      }
    ]
  },
  {
    "product": "SIMATIC Notifier Server for Windows",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions"
      }
    ]
  },
  {
    "product": "SIMATIC PCS neo",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V3.0 SP1"
      }
    ]
  },
  {
    "product": "SIMATIC STEP 7 (TIA Portal) V15",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V15.1 Update 5"
      }
    ]
  },
  {
    "product": "SIMATIC STEP 7 (TIA Portal) V16",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V16 Update 2"
      }
    ]
  },
  {
    "product": "SIMOCODE ES V15.1",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V15.1 Update 4"
      }
    ]
  },
  {
    "product": "SIMOCODE ES V16",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V16 Update 1"
      }
    ]
  },
  {
    "product": "Soft Starter ES V15.1",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V15.1 Update 3"
      }
    ]
  },
  {
    "product": "Soft Starter ES V16",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V16 Update 1"
      }
    ]
  }
]

Social References

More

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2020-7581