Publication Date: |
|
Last Update: |
|
Current Version: | V2.1 |
CVSS v3.1 Base Score: | 8.8 |
Affected Product and Versions | Remediation |
---|---|
All versions < V4 SP2 |
Update to V4 SP2 or later version
|
All versions < V14 SP1 Update 14 |
Update to V14 SP1 Update 14 or later version
|
All versions |
|
All versions < V16 Upd3 |
Update to V16 Upd3 or later version
|
All versions < V3.0 SP1 |
Update to V3.0 SP1 or later version
|
All versions < V17 |
Update to V17 or later version
|
All versions < V21.8 |
Update to V21.8 or later version
|
All versions < V13 SP2 Update 4 |
Update to V13 SP2 Update 4 or later version
|
All versions < V14 SP1 Update 10 |
Update to V14 SP1 Update 10 or later version
|
All versions < V15.1 Update 5 |
Update to V15.1 Update 5 or later version
|
All versions < V16 Update 2 |
Update to V16 Update 2 or later version
|
All versions < V5.6 SP2 HF3 |
Update to V5.6 SP2 HF3 or later version
|
All versions < V3.16 P018 |
Update to V3.16 P018 or later version
|
All versions < V3.17 P003 |
Update to V3.17 P003 or later version
|
All versions < V16 Update 2 |
Update to V16 Update 2 or later version
|
All versions < V13 SP2 Update 4 |
Update to V13 SP2 Update 4 or later version
|
All versions < V14 SP1 Update 10 |
Update to V14 SP1 Update 10 or later version
|
All versions < V15.1 Update 5 |
Update to V15.1 Update 5 or later version
|
All versions < V16 Update 2 |
Update to V16 Update 2 or later version
|
All versions < V7.4 SP1 Update 14 |
Update to V7.4 SP1 Update 14 or later version
|
All versions < V7.5 SP1 Update 3 |
Update to V7.5 SP1 Update 3 or later version
|
All Versions < V16 Update 3 |
Update to V16 Update 3 or later version
|
All Versions < V5.4 HF2 |
Update to V5.4 HF2 or later version
|
All versions < V1.0 SP2 |
Update to version V1.0 SP2 or later version
|
All versions < V14 SP3 |
Update to V14 SP3 or later version
|
All Versions < V6.14 |
Update to V6.14 or later version
|
All Versions < V6.14 |
Update to V6.14 or later version
|
Siemens has identified the following specific workarounds and mitigations that customers can apply to reduce the risk:
Make sure that there is no executable at the following locations:
C:\\Program.exe
, C:\\Program\ Files\\Common.exe
, or C:\\Program\ Files\\Common\ Files\\Siemens\\Automation\\Simatic.exe
TraceConceptX
. This leads to loss of tracing functionality and should only be considered as a temporary workaround.
Product-specific remediations or mitigations can be found in the section
Affected Products and Solution.
Please follow the General Security Recommendations.
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
The vulnerability classification has been performed by using the CVSS scoring system in version 3.1 (CVSS v3.1) (https://www.first.org/cvss/). The CVSS environmental score is specific to the customer’s environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring.
An additional classification has been performed using the CWE classification, a community-developed list of common software security weaknesses. This serves as a common language and as a baseline for weakness identification, mitigation, and prevention efforts. A detailed list of CWE classes can be found at: https://cwe.mitre.org/.
A common component used by the affected applications regularly calls a helper binary with SYSTEM privileges while the call path is not quoted.
This could allow a local attacker to execute arbitrary code with SYTEM privileges.
CVSS v3.1 Base Score | 8.8 |
CVSS Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C |
CWE | CWE-428: Unquoted Search Path or Element |
V1.0 (2020-06-09): | Publication Date |
V1.1 (2020-07-14): | Added solutions for SIMATIC STEP 7 V13, SIMATIC STEP 7 V16, SIMATIC WinCC Runtime Professional V13, SIMATIC WinCC Runtime Professional V16 and SIMATIC WinCC Runtime Advanced |
V1.2 (2020-08-11): | Added solution for SIMATIC PCS neo. Errata: SIMATIC PCS 7 removed from affected products |
V1.3 (2020-09-08): | Added solution for SINAMICS Startdrive, SIMATIC STEP 7 (TIA Portal) V15, and SIMATIC WinCC Runtime Professional V15 |
V1.4 (2020-12-08): | Added solution for SIMATIC S7-1500 Software Controller and SINAMICS STARTER |
V1.5 (2021-01-12): | Added solution for SIMATIC STEP 7 (TIA Portal) V14 and SIMATIC WinCC Runtime Professional V14 |
V1.6 (2021-03-09): | Added solution for SINUMERIK ONE Virtual and SINUMERIK Operate |
V1.7 (2021-06-08): | Added solution for SIMATIC Automation Tool and updated solution for SINEC NMS |
V1.8 (2021-09-14): | Updated solution for SINEMA Server |
V1.9 (2021-11-09): | Added solution for SIMATIC ProSave |
V2.0 (2022-04-12): | Added solution for SIMATIC NET PC Software V14 and clarified affected versions |
V2.1 (2022-12-13): | Corrected description and CVSS score for CVE-2020-7580 |