BDU:2024-04186
Vulnerability from fstec - Published: 14.05.2024
VLAI Severity ?
Title
Уязвимость сетевого программного обеспечения Siemens, связанная с чтением за границами памяти, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость сетевого программного обеспечения Siemens связана с чтением за границами памяти. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании (BSOD) базового ядра Windows
Severity ?
Vendor
Siemens AG
Software Name
Simatic NET PC-Software, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC, SIMATIC PCS 7, SIMATIC WinCC Runtime Professional, S7-PCT, Security Configuration Tool, Simatic Automation Tool, SIMATIC BATCH, SIMATIC PDM, SIMATIC Route Control, SIMATIC STEP 7, SIMATIC WinCC OA, SIMATIC WinCC Unified PC Runtime, SINAMICS Startdrive, SINUMERIK ONE virtual, Siemens SINUMERIK PLC Programming Tool, Siemens TIA Portal Cloud Connector, Siemens Totally Integrated Automation Portal (TIA Portal)
Software Version
- (Simatic NET PC-Software), - (SIMATIC WinCC Runtime Advanced), 7.4 (SIMATIC WinCC), 7.5 (SIMATIC WinCC), 9.1 (SIMATIC PCS 7), 19 (SIMATIC WinCC Runtime Professional), 18 (SIMATIC WinCC Runtime Professional), - (S7-PCT), - (Security Configuration Tool), - (Simatic Automation Tool), от 9.1 до 9.1.2.5 (SIMATIC BATCH), от 9.2 до 9.2 SP2 Upd3 (SIMATIC PDM), от 9.1 до 9.1.2.5 (SIMATIC Route Control), 5 (SIMATIC STEP 7), 3.17 (SIMATIC WinCC OA), от 3.18 до 3.18 P025 (SIMATIC WinCC OA), от 3.19 до 3.19 P010 (SIMATIC WinCC OA), 16 (SIMATIC WinCC Runtime Professional), 17 (SIMATIC WinCC Runtime Professional), - (SIMATIC WinCC Unified PC Runtime), 8.0 (SIMATIC WinCC), до 19 SP1 (SINAMICS Startdrive), до 6.23 (SINUMERIK ONE virtual), - (Siemens SINUMERIK PLC Programming Tool), до 2.0 (Siemens TIA Portal Cloud Connector), 15.1 (Siemens Totally Integrated Automation Portal (TIA Portal)), 16 (Siemens Totally Integrated Automation Portal (TIA Portal)), 17 (Siemens Totally Integrated Automation Portal (TIA Portal)), 18 (Siemens Totally Integrated Automation Portal (TIA Portal)), от 19 до 19 Update 2 (Siemens Totally Integrated Automation Portal (TIA Portal))
Possible Mitigations
Использование рекомендаций производителя:
https://cert-portal.siemens.com/productcert/html/ssa-962515.html
Reference
https://vuldb.com/?id.264134
https://www.cisa.gov/news-events/ics-advisories/icsa-24-137-13
https://cert-portal.siemens.com/productcert/html/ssa-962515.html
CWE
CWE-125
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Siemens AG",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Simatic NET PC-Software), - (SIMATIC WinCC Runtime Advanced), 7.4 (SIMATIC WinCC), 7.5 (SIMATIC WinCC), 9.1 (SIMATIC PCS 7), 19 (SIMATIC WinCC Runtime Professional), 18 (SIMATIC WinCC Runtime Professional), - (S7-PCT), - (Security Configuration Tool), - (Simatic Automation Tool), \u043e\u0442 9.1 \u0434\u043e 9.1.2.5 (SIMATIC BATCH), \u043e\u0442 9.2 \u0434\u043e 9.2 SP2 Upd3 (SIMATIC PDM), \u043e\u0442 9.1 \u0434\u043e 9.1.2.5 (SIMATIC Route Control), 5 (SIMATIC STEP 7), 3.17 (SIMATIC WinCC OA), \u043e\u0442 3.18 \u0434\u043e 3.18 P025 (SIMATIC WinCC OA), \u043e\u0442 3.19 \u0434\u043e 3.19 P010 (SIMATIC WinCC OA), 16 (SIMATIC WinCC Runtime Professional), 17 (SIMATIC WinCC Runtime Professional), - (SIMATIC WinCC Unified PC Runtime), 8.0 (SIMATIC WinCC), \u0434\u043e 19 SP1 (SINAMICS Startdrive), \u0434\u043e 6.23 (SINUMERIK ONE virtual), - (Siemens SINUMERIK PLC Programming Tool), \u0434\u043e 2.0 (Siemens TIA Portal Cloud Connector), 15.1 (Siemens Totally Integrated Automation Portal (TIA Portal)), 16 (Siemens Totally Integrated Automation Portal (TIA Portal)), 17 (Siemens Totally Integrated Automation Portal (TIA Portal)), 18 (Siemens Totally Integrated Automation Portal (TIA Portal)), \u043e\u0442 19 \u0434\u043e 19 Update 2 (Siemens Totally Integrated Automation Portal (TIA Portal))",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://cert-portal.siemens.com/productcert/html/ssa-962515.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.05.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.05.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.05.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-04186",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-46280, SSA-962515, ICSA-24-137-13",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Simatic NET PC-Software, SIMATIC WinCC Runtime Advanced, SIMATIC WinCC, SIMATIC PCS 7, SIMATIC WinCC Runtime Professional, S7-PCT, Security Configuration Tool, Simatic Automation Tool, SIMATIC BATCH, SIMATIC PDM, SIMATIC Route Control, SIMATIC STEP 7, SIMATIC WinCC OA, SIMATIC WinCC Unified PC Runtime, SINAMICS Startdrive, SINUMERIK ONE virtual, Siemens SINUMERIK PLC Programming Tool, Siemens TIA Portal Cloud Connector, Siemens Totally Integrated Automation Portal (TIA Portal)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Siemens, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Siemens \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (BSOD) \u0431\u0430\u0437\u043e\u0432\u043e\u0433\u043e \u044f\u0434\u0440\u0430 Windows",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Siemens AG:\n\u0414\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0432\u0435\u0442\u043a\u0438: \n-SIMATIC PCS 7 9.1\n-SIMATIC STEP 7 5\n-SIMATIC WinCC OA 3.17\n-SIMATIC WinCC Runtime Professional 16\n-SIMATIC WinCC Runtime Professional 17\n-SIMATIC WinCC Runtime Professional 18\n-SIMATIC WinCC Runtime Professional 19\n-SIMATIC WinCC 7.4\n-SIMATIC WinCC 7.5\n-SIMATIC WinCC 8.0\n-Totally Integrated Automation Portal (TIA Portal) 15.1\n-Totally Integrated Automation Portal (TIA Portal) 16\n-Totally Integrated Automation Portal (TIA Portal) 17\n-Totally Integrated Automation Portal (TIA Portal) 18",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://vuldb.com/?id.264134\nhttps://www.cisa.gov/news-events/ics-advisories/icsa-24-137-13\nhttps://cert-portal.siemens.com/productcert/html/ssa-962515.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f, \u0421\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…