SSA-678983
Vulnerability from csaf_siemens - Published: 2021-05-11 00:00 - Updated: 2022-12-13 00:00Summary
SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020)
Notes
Summary
Intel has published information on vulnerabilities in Intel products in
November 2020.
This advisory lists the Siemens IPC related products, that are affected by these vulnerabilities.
In this advisory we take a representative CVE from each advisory:
-
“Intel CSME, SPS, TXE, AMT and DAL Advisory” Intel-SA-00391 is represented by CVE-2020-8745
-
“Intel RAPL Interface Advisory” Intel-SA-00389 is represented by CVE-2020-8694
-
“Intel Processor Advisory” Intel-SA-00381 is represented by CVE-2020-8698, and
-
“BIOS Advisory” Intel-SA-00358 is represented by CVE-2020-0590.
Siemens has released updates for the affected products and recommends to update to the latest versions.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at:
https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"notes": [
{
"category": "summary",
"text": "Intel has published information on vulnerabilities in Intel products in \nNovember 2020.\nThis advisory lists the Siemens IPC related products, that are affected by these vulnerabilities.\nIn this advisory we take a representative CVE from each advisory:\n\n- \n\u201cIntel CSME, SPS, TXE, AMT and DAL Advisory\u201d Intel-SA-00391 is represented by CVE-2020-8745\n\n\n- \n\u201cIntel RAPL Interface Advisory\u201d Intel-SA-00389 is represented by CVE-2020-8694\n\n\n- \n\u201cIntel Processor Advisory\u201d Intel-SA-00381 is represented by CVE-2020-8698, and \n\n\n- \n\u201cBIOS Advisory\u201d Intel-SA-00358 is represented by CVE-2020-0590.\n\n\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020) - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
},
{
"category": "self",
"summary": "SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020) - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-678983.txt"
},
{
"category": "self",
"summary": "SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020) - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-678983.json"
}
],
"title": "SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020)",
"tracking": {
"current_release_date": "2022-12-13T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-678983",
"initial_release_date": "2021-05-11T00:00:00Z",
"revision_history": [
{
"date": "2021-05-11T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-06-08T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added remediations for SIMATIC IPC427E, SIMATIC IPC477E (PRO), and SIMATIC IPC527G"
},
{
"date": "2021-08-10T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added remediations for SIMATIC IPC127E, SINUMERIK 828D HW PU.4, SINUMERIK MC MCU 1720, SINUMERIK ONE NCU 1740 and SINUMERIK ONE PPU 1740, added SIMATIC Drive Controller"
},
{
"date": "2022-03-08T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added solution for SIMATIC ET 200SP Open Controller CPU 1515SP PC2"
},
{
"date": "2022-05-10T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added solution for SIMATIC IPC547G"
},
{
"date": "2022-07-12T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added fix for SIMATIC Field PG M6"
},
{
"date": "2022-12-13T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added fix for SINUMERIK ONE / 840D sl Handheld Terminal HT 10"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V05.00.01.00",
"product": {
"name": "SIMATIC Drive Controller family",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SIMATIC Drive Controller family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V0209_0105",
"product": {
"name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V22.01.08",
"product": {
"name": "SIMATIC Field PG M5",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "SIMATIC Field PG M5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V26.01.08",
"product": {
"name": "SIMATIC Field PG M6",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "SIMATIC Field PG M6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC IPC127E",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC127E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V21.01.15",
"product": {
"name": "SIMATIC IPC427E (incl. SIPLUS variants)",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC427E (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V21.01.15",
"product": {
"name": "SIMATIC IPC477E",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC477E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V21.01.15",
"product": {
"name": "SIMATIC IPC477E Pro",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC477E Pro"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.4.0",
"product": {
"name": "SIMATIC IPC527G",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC527G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c R1.30.0",
"product": {
"name": "SIMATIC IPC547G",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC547G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V25.02.08",
"product": {
"name": "SIMATIC IPC627E",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC627E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V25.02.08",
"product": {
"name": "SIMATIC IPC647E",
"product_id": "12"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC647E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V25.02.08",
"product": {
"name": "SIMATIC IPC677E",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC677E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V25.02.08",
"product": {
"name": "SIMATIC IPC847E",
"product_id": "14"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC847E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V23.01.08",
"product": {
"name": "SIMATIC ITP1000",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "SIMATIC ITP1000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All Versions \u003c V08.00.00.00",
"product": {
"name": "SINUMERIK 828D HW PU.4",
"product_id": "16"
}
}
],
"category": "product_name",
"name": "SINUMERIK 828D HW PU.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V05.00.00.00",
"product": {
"name": "SINUMERIK MC MCU 1720",
"product_id": "17"
}
}
],
"category": "product_name",
"name": "SINUMERIK MC MCU 1720"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V08.00.00.00",
"product": {
"name": "SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V04.00.00.00",
"product": {
"name": "SINUMERIK ONE NCU 1740",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "SINUMERIK ONE NCU 1740"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V06.00.00.00",
"product": {
"name": "SINUMERIK ONE PPU 1740",
"product_id": "20"
}
}
],
"category": "product_name",
"name": "SINUMERIK ONE PPU 1740"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0590",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in BIOS firmware for some Intel Processors may\nallow an authenticated user to potentially enable escalation of privilege\nvia local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"4",
"9",
"10",
"11",
"12",
"13",
"14"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run untrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code if possible.",
"product_ids": [
"4",
"9",
"10",
"11",
"12",
"13",
"14"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: \nhttps://www.siemens.com/industrialsecurity",
"product_ids": [
"4",
"9",
"10",
"11",
"12",
"13",
"14"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V26.01.08 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V1.4.0 or later version",
"product_ids": [
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to R1.30.0 or later version",
"product_ids": [
"10"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V25.02.08 or later version",
"product_ids": [
"11",
"12",
"13",
"14"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"4",
"9",
"10",
"11",
"12",
"13",
"14"
]
}
],
"title": "CVE-2020-0590"
},
{
"cve": "CVE-2020-8694",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Insufficient access control in the Linux kernel driver for some\nIntel Processors may allow an authenticated user to potentially enable\ninformation disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"3",
"4",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run untrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code if possible.",
"product_ids": [
"3",
"4",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: \nhttps://www.siemens.com/industrialsecurity",
"product_ids": [
"3",
"4",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V22.01.08 or later version",
"product_ids": [
"3"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V26.01.08 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V21.01.15 or later version",
"product_ids": [
"6",
"7",
"8"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V1.4.0 or later version",
"product_ids": [
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to R1.30.0 or later version",
"product_ids": [
"10"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V25.02.08 or later version",
"product_ids": [
"11",
"12",
"13",
"14"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V23.01.08 or later version",
"product_ids": [
"15"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"3",
"4",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15"
]
}
],
"title": "CVE-2020-8694"
},
{
"cve": "CVE-2020-8698",
"cwe": {
"id": "CWE-1189",
"name": "Improper Isolation of Shared Resources on System-on-a-Chip (SoC)"
},
"notes": [
{
"category": "summary",
"text": "Improper isolation of shared resources in some Intel Processors may allow an\nauthenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"3",
"4",
"6",
"7",
"8",
"11",
"12",
"13",
"14",
"15"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run untrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code if possible.",
"product_ids": [
"3",
"4",
"6",
"7",
"8",
"11",
"12",
"13",
"14",
"15"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: \nhttps://www.siemens.com/industrialsecurity",
"product_ids": [
"3",
"4",
"6",
"7",
"8",
"11",
"12",
"13",
"14",
"15"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V22.01.08 or later version",
"product_ids": [
"3"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V26.01.08 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V21.01.15 or later version",
"product_ids": [
"6",
"7",
"8"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V25.02.08 or later version",
"product_ids": [
"11",
"12",
"13",
"14"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V23.01.08 or later version",
"product_ids": [
"15"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"3",
"4",
"6",
"7",
"8",
"11",
"12",
"13",
"14",
"15"
]
}
],
"title": "CVE-2020-8698"
},
{
"cve": "CVE-2020-8745",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run untrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code if possible.",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: \nhttps://www.siemens.com/industrialsecurity",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V22.01.08 or later version",
"product_ids": [
"3"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V26.01.08 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V27.01.05 or later version",
"product_ids": [
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V21.01.15 or later version",
"product_ids": [
"6",
"7",
"8"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V1.4.0 or later version",
"product_ids": [
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V25.02.08 or later version",
"product_ids": [
"11",
"12",
"13",
"14"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V23.01.08 or later version",
"product_ids": [
"15"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V0209_0105 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109743969/"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V05.00.00.00 or later version\nSINUMERIK software can be obtained from your local Siemens account manager.",
"product_ids": [
"17"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V08.00.00.00 or later version\nSINUMERIK software can be obtained from your local Siemens account manager.",
"product_ids": [
"16",
"18"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V06.00.00.00 or later version\nSINUMERIK software can be obtained from your local Siemens account manager.",
"product_ids": [
"20"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V05.00.01.00 or later version\nThe update can be obtained from your local Siemens account manager.",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V04.00.00.00 or later version\nSINUMERIK software can be obtained from your local Siemens account manager.",
"product_ids": [
"19"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2020-8745"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…