CNVD-2024-09315
Vulnerability from cnvd - Published: 2024-02-23
VLAI Severity ?
Title
多款Siemens产品空指针解引用漏洞
Description
SIMATIC PCS 7是一个集散控制系统(DCS),集成了SIMATIC WinCC、SIMATIC Batch、SIMATIC Route control、OpenPCS 7等组件。SIMATIC WinCC是一个监控和数据采集(SCADA)系统。SIMATIC WinCC Runtime Professional是一个可视化运行时平台,用于操作员控制和监视机器和工厂。
多款Siemens产品存在空指针解引用漏洞,攻击者可利用该漏洞在RPC服务器中导致拒绝服务状态。
Severity
中
Patch Name
多款Siemens产品空指针解引用漏洞的补丁
Patch Description
SIMATIC PCS 7是一个集散控制系统(DCS),集成了SIMATIC WinCC、SIMATIC Batch、SIMATIC Route control、OpenPCS 7等组件。SIMATIC WinCC是一个监控和数据采集(SCADA)系统。SIMATIC WinCC Runtime Professional是一个可视化运行时平台,用于操作员控制和监视机器和工厂。
多款Siemens产品存在空指针解引用漏洞,攻击者可利用该漏洞在RPC服务器中导致拒绝服务状态。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://cert-portal.siemens.com/productcert/html/ssa-753746.html
Reference
https://cert-portal.siemens.com/productcert/html/ssa-753746.html
Impacted products
| Name | ['SIEMENS SIMATIC WinCC V7.4', 'SIEMENS SIMATIC PCS 7 V9.1', 'Siemens OpenPCS 7 9.1', 'Siemens SIMATIC BATCH 9.1', 'Siemens SIMATIC Route Control 9.1', 'Siemens SIMATIC WinCC Runtime Professional V18', 'Siemens SIMATIC WinCC Runtime Professional V19', 'Siemens SIMATIC WinCC <7.5 SP2 Update 15', 'Siemens SIMATIC WinCC <8.0 SP4'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2023-48363"
}
},
"description": "SIMATIC PCS 7\u662f\u4e00\u4e2a\u96c6\u6563\u63a7\u5236\u7cfb\u7edf(DCS)\uff0c\u96c6\u6210\u4e86SIMATIC WinCC\u3001SIMATIC Batch\u3001SIMATIC Route control\u3001OpenPCS 7\u7b49\u7ec4\u4ef6\u3002SIMATIC WinCC\u662f\u4e00\u4e2a\u76d1\u63a7\u548c\u6570\u636e\u91c7\u96c6(SCADA)\u7cfb\u7edf\u3002SIMATIC WinCC Runtime Professional\u662f\u4e00\u4e2a\u53ef\u89c6\u5316\u8fd0\u884c\u65f6\u5e73\u53f0\uff0c\u7528\u4e8e\u64cd\u4f5c\u5458\u63a7\u5236\u548c\u76d1\u89c6\u673a\u5668\u548c\u5de5\u5382\u3002\n\n\u591a\u6b3eSiemens\u4ea7\u54c1\u5b58\u5728\u7a7a\u6307\u9488\u89e3\u5f15\u7528\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728RPC\u670d\u52a1\u5668\u4e2d\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u72b6\u6001\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://cert-portal.siemens.com/productcert/html/ssa-753746.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-09315",
"openTime": "2024-02-23",
"patchDescription": "SIMATIC PCS 7\u662f\u4e00\u4e2a\u96c6\u6563\u63a7\u5236\u7cfb\u7edf(DCS)\uff0c\u96c6\u6210\u4e86SIMATIC WinCC\u3001SIMATIC Batch\u3001SIMATIC Route control\u3001OpenPCS 7\u7b49\u7ec4\u4ef6\u3002SIMATIC WinCC\u662f\u4e00\u4e2a\u76d1\u63a7\u548c\u6570\u636e\u91c7\u96c6(SCADA)\u7cfb\u7edf\u3002SIMATIC WinCC Runtime Professional\u662f\u4e00\u4e2a\u53ef\u89c6\u5316\u8fd0\u884c\u65f6\u5e73\u53f0\uff0c\u7528\u4e8e\u64cd\u4f5c\u5458\u63a7\u5236\u548c\u76d1\u89c6\u673a\u5668\u548c\u5de5\u5382\u3002\r\n\r\n\u591a\u6b3eSiemens\u4ea7\u54c1\u5b58\u5728\u7a7a\u6307\u9488\u89e3\u5f15\u7528\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728RPC\u670d\u52a1\u5668\u4e2d\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u72b6\u6001\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eSiemens\u4ea7\u54c1\u7a7a\u6307\u9488\u89e3\u5f15\u7528\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"SIEMENS SIMATIC WinCC V7.4",
"SIEMENS SIMATIC PCS 7 V9.1",
"Siemens OpenPCS 7 9.1",
"Siemens SIMATIC BATCH 9.1",
"Siemens SIMATIC Route Control 9.1",
"Siemens SIMATIC WinCC Runtime Professional V18",
"Siemens SIMATIC WinCC Runtime Professional V19",
"Siemens SIMATIC WinCC \u003c7.5 SP2 Update 15",
"Siemens SIMATIC WinCC \u003c8.0 SP4"
]
},
"referenceLink": "https://cert-portal.siemens.com/productcert/html/ssa-753746.html",
"serverity": "\u4e2d",
"submitTime": "2024-02-21",
"title": "\u591a\u6b3eSiemens\u4ea7\u54c1\u7a7a\u6307\u9488\u89e3\u5f15\u7528\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…