FKIE_CVE-2023-27465
Vulnerability from fkie_nvd - Published: 2023-06-13 09:15 - Updated: 2024-11-21 07:52
Severity ?
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
A vulnerability has been identified in SIMOTION C240 (All versions >= V5.4 < V5.5 SP1), SIMOTION C240 PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D410-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D425-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP (All versions >= V5.4 < V5.5 SP1), SIMOTION D435-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D445-2 DP/PN (All versions >= V5.4), SIMOTION D445-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION D455-2 DP/PN (All versions >= V5.4 < V5.5 SP1), SIMOTION P320-4 E (All versions >= V5.4), SIMOTION P320-4 S (All versions >= V5.4). When operated with Security Level Low the device does not protect access to certain services relevant for debugging. This could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device.
References
| URL | Tags | ||
|---|---|---|---|
| productcert@siemens.com | https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf | Patch, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_d425-2_dp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A65B54E-FE29-4352-8BA4-60C2F23F87F8",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_d425-2_dp_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "B6979F0F-FA12-422F-938D-0C84D39F69E9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_d425-2_dp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFD83F3F-CF11-44D9-8F9C-0B8D33BC3481",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_d425-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50C77E0A-9C5D-43EA-9157-C94CF4ACBE98",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_d425-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "35BA3146-E138-48C5-BAFB-36FF795C8591",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_d425-2_dp\\/pn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A007F9C-B6E3-4606-A7C2-B78E5F51C9BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_d435-2_dp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "848DE61E-A4F9-4368-82AB-EA6FCD369EDB",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_d435-2_dp_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "EC2302CA-AD84-4FE8-98EA-7764A5B8978B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_d435-2_dp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80932D46-6182-4B9D-9A66-BC381052DBF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_d435-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2ACB98-373C-471C-B5A7-8D1BE59BBDA7",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_d435-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "AB781258-8A47-4388-A115-68ACF6CFD420",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_d435-2_dp\\/pn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3371CB24-AB41-44C7-93B7-78E2BD171D42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\)_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B8C9F9-9474-4153-8CCA-60308E13543D",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\)_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "117C8E63-C09D-412C-9B68-F2C72A8CCEDD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_d445-2_dp\\/pn_\\(0aa1\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9044F0-7E54-4C66-8613-A440B71D9D0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_d445-2_dp\\/pn_\\(0aa0\\)_firmware:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9D8FBD-E8E7-43E1-922F-973851E0D160",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_d445-2_dp\\/pn_\\(0aa0\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "05D488BB-E0B5-46DF-B303-98524A39EEC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_d455-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB06BE4-AA5C-4367-B34F-BB3FC17B9470",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_d455-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "995B8740-C501-4448-9D22-4D115FAAE543",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_d455-2_dp\\/pn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53FBAAA1-4012-463D-864B-C7BEAE15093E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_p320-4_e_firmware:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2C90B0F9-BBC8-417E-98FD-30BC069E769D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_p320-4_e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80DFB571-E3FA-44AA-B81C-AC7E13FFCB01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_p320-4_s_firmware:5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D49AFE41-D93E-4488-A5CB-AC48BB5921D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_p320-4_s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4849FE93-67D0-496F-B47D-5035FF902540",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_d410-2_dp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91C51B40-4344-4796-AF7B-9F85D255A113",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_d410-2_dp_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "E2E25B36-BB4D-40B6-91A2-FC344E063B45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_d410-2_dp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2899391-D29A-4C95-A795-1B7EADCDF799",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_d410-2_dp\\/pn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52950381-7B46-46F7-9B44-0313EA47EA87",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_d410-2_dp\\/pn_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "BFA771D3-A08F-4690-853D-F07B47EC83AE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_d410-2_dp\\/pn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C5013B-BE8F-4635-9F7E-006EE737A4A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_c240_pn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "625A4A2B-37BB-4534-B1DD-3B18862F97BC",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_c240_pn_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "2BE0D94D-FFF4-4913-9376-A3389579CC70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_c240_pn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2355A13D-6E84-4F35-8BE6-223C086E3719",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_c240_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94035BD3-584A-4F93-A9AB-75A32F1628E2",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:siemens:simotion_c240_firmware:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "6E8FF00E-5125-4CD8-BD83-9F595ABA3B11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_c240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48B461ED-4B04-4EC2-B88E-F50D53509B1D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMOTION C240 (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION C240 PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D410-2 DP (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D410-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D425-2 DP (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D425-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D435-2 DP (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D435-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D445-2 DP/PN (All versions \u003e= V5.4), SIMOTION D445-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION D455-2 DP/PN (All versions \u003e= V5.4 \u003c V5.5 SP1), SIMOTION P320-4 E (All versions \u003e= V5.4), SIMOTION P320-4 S (All versions \u003e= V5.4). When operated with Security Level Low the device does not protect access to certain services relevant for debugging. This could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device."
}
],
"id": "CVE-2023-27465",
"lastModified": "2024-11-21T07:52:57.883",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6,
"source": "productcert@siemens.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-06-13T09:15:16.557",
"references": [
{
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-482956.pdf"
}
],
"sourceIdentifier": "productcert@siemens.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-213"
}
],
"source": "productcert@siemens.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…