Lucene search

K
cve[email protected]CVE-2023-28832
HistoryMay 09, 2023 - 1:15 p.m.

CVE-2023-28832

2023-05-0913:15:17
CWE-77
web.nvd.nist.gov
13
cve-2023-28832
simatic cloud connect
vulnerability
command injection
remote attack
root privileges

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.1%

A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1). The web based management of affected devices does not properly validate user input, making it susceptible to command injection. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges.

Affected configurations

NVD
Node
siemens6gk1411-1ac00_firmwareMatch2.0
AND
siemens6gk1411-1ac00Match-
Node
siemens6gk1411-5ac00_firmwareMatch2.0
AND
siemens6gk1411-5ac00Match-

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "SIMATIC Cloud Connect 7 CC712",
    "versions": [
      {
        "version": "All versions >= V2.0 < V2.1",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "SIMATIC Cloud Connect 7 CC716",
    "versions": [
      {
        "version": "All versions >= V2.0 < V2.1",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.1%

Related for CVE-2023-28832