cve-2019-10918
Vulnerability from cvelistv5
Published
2019-05-14 19:54
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
▼ | URL | Tags | |
---|---|---|---|
productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf | Vendor Advisory | |
productcert@siemens.com | https://www.us-cert.gov/ics/advisories/ICSA-19-134-08 | Third Party Advisory, US Government Resource |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:15.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SIMATIC PCS 7 V8.0 and earlier", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SIMATIC PCS 7 V8.1", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V8.1 with WinCC V7.3 Upd 19" } ] }, { "product": "SIMATIC PCS 7 V8.2", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V8.2 SP1 with WinCC V7.4 SP1 Upd11" } ] }, { "product": "SIMATIC PCS 7 V9.0", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V9.0 SP2 with WinCC V7.4 SP1 Upd11" } ] }, { "product": "SIMATIC WinCC (TIA Portal) V13", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SIMATIC WinCC (TIA Portal) V14", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V14 SP1 Upd 9" } ] }, { "product": "SIMATIC WinCC (TIA Portal) V15", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V15.1 Upd 3" } ] }, { "product": "SIMATIC WinCC Runtime Professional V13", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SIMATIC WinCC Runtime Professional V14", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V14.1 Upd 8" } ] }, { "product": "SIMATIC WinCC Runtime Professional V15", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V15.1 Upd 3" } ] }, { "product": "SIMATIC WinCC V7.2 and earlier", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "product": "SIMATIC WinCC V7.3", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V7.3 Upd 19" } ] }, { "product": "SIMATIC WinCC V7.4", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V7.4 SP1 Upd 11" } ] }, { "product": "SIMATIC WinCC V7.5", "vendor": "Siemens AG", "versions": [ { "status": "affected", "version": "All versions \u003c V7.5 Upd 3" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions \u003c V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions \u003c V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions \u003c V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions \u003c V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions \u003c V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions \u003c V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions \u003c V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions \u003c V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions \u003c V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-749", "description": "CWE-749: Exposed Dangerous Method or Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-23T19:28:42", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2019-10918", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SIMATIC PCS 7 V8.0 and earlier", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SIMATIC PCS 7 V8.1", "version": { "version_data": [ { "version_value": "All versions \u003c V8.1 with WinCC V7.3 Upd 19" } ] } }, { "product_name": "SIMATIC PCS 7 V8.2", "version": { "version_data": [ { "version_value": "All versions \u003c V8.2 SP1 with WinCC V7.4 SP1 Upd11" } ] } }, { "product_name": "SIMATIC PCS 7 V9.0", "version": { "version_data": [ { "version_value": "All versions \u003c V9.0 SP2 with WinCC V7.4 SP1 Upd11" } ] } }, { "product_name": "SIMATIC WinCC (TIA Portal) V13", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SIMATIC WinCC (TIA Portal) V14", "version": { "version_data": [ { "version_value": "All versions \u003c V14 SP1 Upd 9" } ] } }, { "product_name": "SIMATIC WinCC (TIA Portal) V15", "version": { "version_data": [ { "version_value": "All versions \u003c V15.1 Upd 3" } ] } }, { "product_name": "SIMATIC WinCC Runtime Professional V13", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SIMATIC WinCC Runtime Professional V14", "version": { "version_data": [ { "version_value": "All versions \u003c V14.1 Upd 8" } ] } }, { "product_name": "SIMATIC WinCC Runtime Professional V15", "version": { "version_data": [ { "version_value": "All versions \u003c V15.1 Upd 3" } ] } }, { "product_name": "SIMATIC WinCC V7.2 and earlier", "version": { "version_data": [ { "version_value": "All versions" } ] } }, { "product_name": "SIMATIC WinCC V7.3", "version": { "version_data": [ { "version_value": "All versions \u003c V7.3 Upd 19" } ] } }, { "product_name": "SIMATIC WinCC V7.4", "version": { "version_data": [ { "version_value": "All versions \u003c V7.4 SP1 Upd 11" } ] } }, { "product_name": "SIMATIC WinCC V7.5", "version": { "version_data": [ { "version_value": "All versions \u003c V7.5 Upd 3" } ] } } ] }, "vendor_name": "Siemens AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions \u003c V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions \u003c V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions \u003c V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions \u003c V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions \u003c V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions \u003c V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions \u003c V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions \u003c V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions \u003c V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-749: Exposed Dangerous Method or Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf" }, { "name": "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/ICSA-19-134-08" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2019-10918", "datePublished": "2019-05-14T19:54:48", "dateReserved": "2019-04-08T00:00:00", "dateUpdated": "2024-08-04T22:40:15.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-10918\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2019-05-14T20:29:02.483\",\"lastModified\":\"2021-10-28T13:37:17.673\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions \u003c V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions \u003c V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions \u003c V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions \u003c V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions \u003c V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions \u003c V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions \u003c V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions \u003c V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions \u003c V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en SIMATIC PCS 7 V8.0 y anteriores (Todas las versiones), SIMATIC PCS 7 V8.1 (Todas las versiones anteriores a la versi\u00f3n V8.1 con WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (Todas las versiones anteriores a la versi\u00f3n V8.2 SP1 con WinCC V7.4 SP1 Upd 11), SIMATIC PCS 7 V9.0 (Todas las versiones anteriores a la versi\u00f3n V9.0 SP2 con WinCC V7.4 SP1 Upd11), SIMATIC WinCC Professional (TIA Portal V13) (Todas las versiones) , SIMATIC WinCC Professional (TIA Portal V14) (Todas las versiones anteriores a la versi\u00f3n V14 SP1 Upd 9), SIMATIC WinCC Professional (TIA Portal V15) (Todas las versiones anteriores a la versi\u00f3n V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (Todas las versiones), SIMATIC WinCC Runtime Professional V14 (Todas las versiones anteriores a la versi\u00f3n V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (Todas las versiones anteriores a la versi\u00f3n V15.1 Upd 3), SIMATIC WinCC V7.2 y anteriores (Todas las versiones), SIMATIC WinCC V7.3 (Todas las versiones anteriores a la versi\u00f3n V7.3 Upd 19), SIMATIC WinCC V7.4 (Todas las versiones anteriores a la versi\u00f3n V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (Todas las versiones anteriores a la versi\u00f3n V7.5 Upd 3). La aplicaci\u00f3n web SIMATIC WinCC DataMonitor de los productos afectados permite cargar c\u00f3digo ASPX arbitrario. La vulnerbilidad de seguridad podr\u00eda ser explotada por un atacante autenticado con acceso de red a la aplicaci\u00f3n WinCC DataMonitor. No se requiere interacci\u00f3n del usuario para explotar esta vulnerabilidad. La vulnerabilidad afecta la confidencialidad, integridad y disponibilidad del dispositivo afectado. En la etapa de publicaci\u00f3n de este aviso de seguridad no se conoce explotaci\u00f3n p\u00fablica.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.0},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]},{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-749\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0\",\"matchCriteriaId\":\"78F045C4-8DC2-4FA8-833D-B430EA26F2A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"858628AC-EA69-4D72-AE23-77A4A8DE2547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4A75F15-8F47-4348-A85C-D94BBA8F9992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs_7:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F27A96F-58B7-492F-8CF7-DE04D4EDAAD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.2\",\"matchCriteriaId\":\"23B89914-E5BA-4670-B692-092AE9FFE148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D6229A2-9B8E-4F76-8425-589D2CE58B16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F64B795A-7E66-49AE-BE40-E8EEAC12D280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D3A0BA7-EDC9-428D-A9C9-1CF602CEDFB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc_\\\\(tia_portal\\\\):13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3D1A823-CE50-441F-B060-DA678DFE24FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc_\\\\(tia_portal\\\\):14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A1BA01-7A92-4368-8A73-8FA47A08BC53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc_\\\\(tia_portal\\\\):15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0256663E-3A97-4E99-995D-7446804DB496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E07DBA91-379C-40F5-8C45-6EC302F5CA7D\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/ICSA-19-134-08\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.