SSA-678983
Vulnerability from csaf_siemens - Published: 2021-05-11 00:00 - Updated: 2022-12-13 00:00Summary
SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020)
Notes
Summary: Intel has published information on vulnerabilities in Intel products in
November 2020.
This advisory lists the Siemens IPC related products, that are affected by these vulnerabilities.
In this advisory we take a representative CVE from each advisory:
-
“Intel CSME, SPS, TXE, AMT and DAL Advisory” Intel-SA-00391 is represented by CVE-2020-8745
-
“Intel RAPL Interface Advisory” Intel-SA-00389 is represented by CVE-2020-8694
-
“Intel Processor Advisory” Intel-SA-00381 is represented by CVE-2020-8698, and
-
“BIOS Advisory” Intel-SA-00358 is represented by CVE-2020-0590.
Siemens has released updates for the affected products and recommends to update to the latest versions.
General Recommendations: As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at:
https://www.siemens.com/industrialsecurity
Additional Resources: For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use: Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
CWE-20
- Improper Input Validation
Affected products
Known affected
7 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC Field PG M6
Siemens / SIMATIC Field PG M6
|
< V26.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC527G
Siemens / SIMATIC IPC527G
|
All BIOS versions < V1.4.0 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC547G
Siemens / SIMATIC IPC547G
|
< R1.30.0 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC627E
Siemens / SIMATIC IPC627E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC647E
Siemens / SIMATIC IPC647E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC677E
Siemens / SIMATIC IPC677E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC847E
Siemens / SIMATIC IPC847E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
CWE-287
- Improper Authentication
Affected products
Known affected
12 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC Field PG M5
Siemens / SIMATIC Field PG M5
|
All BIOS versions < V22.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC Field PG M6
Siemens / SIMATIC Field PG M6
|
< V26.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC427E (incl. SIPLUS variants)
Siemens / SIMATIC IPC427E (incl. SIPLUS variants)
|
All BIOS versions < V21.01.15 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC477E
Siemens / SIMATIC IPC477E
|
All BIOS versions < V21.01.15 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC477E Pro
Siemens / SIMATIC IPC477E Pro
|
All BIOS versions < V21.01.15 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC527G
Siemens / SIMATIC IPC527G
|
All BIOS versions < V1.4.0 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC547G
Siemens / SIMATIC IPC547G
|
< R1.30.0 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC627E
Siemens / SIMATIC IPC627E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC647E
Siemens / SIMATIC IPC647E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC677E
Siemens / SIMATIC IPC677E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC847E
Siemens / SIMATIC IPC847E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC ITP1000
Siemens / SIMATIC ITP1000
|
All BIOS versions < V23.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
CWE-1189
- Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC Field PG M5
Siemens / SIMATIC Field PG M5
|
All BIOS versions < V22.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC Field PG M6
Siemens / SIMATIC Field PG M6
|
< V26.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC427E (incl. SIPLUS variants)
Siemens / SIMATIC IPC427E (incl. SIPLUS variants)
|
All BIOS versions < V21.01.15 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC477E
Siemens / SIMATIC IPC477E
|
All BIOS versions < V21.01.15 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC477E Pro
Siemens / SIMATIC IPC477E Pro
|
All BIOS versions < V21.01.15 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC627E
Siemens / SIMATIC IPC627E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC647E
Siemens / SIMATIC IPC647E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC677E
Siemens / SIMATIC IPC677E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC847E
Siemens / SIMATIC IPC847E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC ITP1000
Siemens / SIMATIC ITP1000
|
All BIOS versions < V23.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
CWE-269
- Improper Privilege Management
Affected products
Known affected
19 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SIMATIC Drive Controller family
Siemens / SIMATIC Drive Controller family
|
< V05.00.01.00 |
Mitigation
Mitigation
Vendor Fix
|
|
|
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)
Siemens / SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)
|
< V0209_0105 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC Field PG M5
Siemens / SIMATIC Field PG M5
|
All BIOS versions < V22.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC Field PG M6
Siemens / SIMATIC Field PG M6
|
< V26.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC127E
Siemens / SIMATIC IPC127E
|
vers:all/* |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC427E (incl. SIPLUS variants)
Siemens / SIMATIC IPC427E (incl. SIPLUS variants)
|
All BIOS versions < V21.01.15 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC477E
Siemens / SIMATIC IPC477E
|
All BIOS versions < V21.01.15 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC477E Pro
Siemens / SIMATIC IPC477E Pro
|
All BIOS versions < V21.01.15 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC527G
Siemens / SIMATIC IPC527G
|
All BIOS versions < V1.4.0 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC627E
Siemens / SIMATIC IPC627E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC647E
Siemens / SIMATIC IPC647E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC677E
Siemens / SIMATIC IPC677E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC IPC847E
Siemens / SIMATIC IPC847E
|
All BIOS versions < V25.02.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SIMATIC ITP1000
Siemens / SIMATIC ITP1000
|
All BIOS versions < V23.01.08 |
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
SINUMERIK 828D HW PU.4
Siemens / SINUMERIK 828D HW PU.4
|
All Versions < V08.00.00.00 |
Mitigation
Mitigation
Vendor Fix
|
|
|
SINUMERIK MC MCU 1720
Siemens / SINUMERIK MC MCU 1720
|
< V05.00.00.00 |
Mitigation
Mitigation
Vendor Fix
|
|
|
SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10
Siemens / SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10
|
< V08.00.00.00 |
Mitigation
Mitigation
Vendor Fix
|
|
|
SINUMERIK ONE NCU 1740
Siemens / SINUMERIK ONE NCU 1740
|
< V04.00.00.00 |
Mitigation
Mitigation
Vendor Fix
|
|
|
SINUMERIK ONE PPU 1740
Siemens / SINUMERIK ONE PPU 1740
|
< V06.00.00.00 |
Mitigation
Mitigation
Vendor Fix
|
References
3 references
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"notes": [
{
"category": "summary",
"text": "Intel has published information on vulnerabilities in Intel products in \nNovember 2020.\nThis advisory lists the Siemens IPC related products, that are affected by these vulnerabilities.\nIn this advisory we take a representative CVE from each advisory:\n\n- \n\u201cIntel CSME, SPS, TXE, AMT and DAL Advisory\u201d Intel-SA-00391 is represented by CVE-2020-8745\n\n\n- \n\u201cIntel RAPL Interface Advisory\u201d Intel-SA-00389 is represented by CVE-2020-8694\n\n\n- \n\u201cIntel Processor Advisory\u201d Intel-SA-00381 is represented by CVE-2020-8698, and \n\n\n- \n\u201cBIOS Advisory\u201d Intel-SA-00358 is represented by CVE-2020-0590.\n\n\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: \nhttps://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020) - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf"
},
{
"category": "self",
"summary": "SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020) - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-678983.txt"
},
{
"category": "self",
"summary": "SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020) - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-678983.json"
}
],
"title": "SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020)",
"tracking": {
"current_release_date": "2022-12-13T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-678983",
"initial_release_date": "2021-05-11T00:00:00Z",
"revision_history": [
{
"date": "2021-05-11T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-06-08T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added remediations for SIMATIC IPC427E, SIMATIC IPC477E (PRO), and SIMATIC IPC527G"
},
{
"date": "2021-08-10T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added remediations for SIMATIC IPC127E, SINUMERIK 828D HW PU.4, SINUMERIK MC MCU 1720, SINUMERIK ONE NCU 1740 and SINUMERIK ONE PPU 1740, added SIMATIC Drive Controller"
},
{
"date": "2022-03-08T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added solution for SIMATIC ET 200SP Open Controller CPU 1515SP PC2"
},
{
"date": "2022-05-10T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added solution for SIMATIC IPC547G"
},
{
"date": "2022-07-12T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added fix for SIMATIC Field PG M6"
},
{
"date": "2022-12-13T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added fix for SINUMERIK ONE / 840D sl Handheld Terminal HT 10"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V05.00.01.00",
"product": {
"name": "SIMATIC Drive Controller family",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SIMATIC Drive Controller family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V0209_0105",
"product": {
"name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V22.01.08",
"product": {
"name": "SIMATIC Field PG M5",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "SIMATIC Field PG M5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V26.01.08",
"product": {
"name": "SIMATIC Field PG M6",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "SIMATIC Field PG M6"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "SIMATIC IPC127E",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC127E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V21.01.15",
"product": {
"name": "SIMATIC IPC427E (incl. SIPLUS variants)",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC427E (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V21.01.15",
"product": {
"name": "SIMATIC IPC477E",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC477E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V21.01.15",
"product": {
"name": "SIMATIC IPC477E Pro",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC477E Pro"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V1.4.0",
"product": {
"name": "SIMATIC IPC527G",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC527G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c R1.30.0",
"product": {
"name": "SIMATIC IPC547G",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC547G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V25.02.08",
"product": {
"name": "SIMATIC IPC627E",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC627E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V25.02.08",
"product": {
"name": "SIMATIC IPC647E",
"product_id": "12"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC647E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V25.02.08",
"product": {
"name": "SIMATIC IPC677E",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC677E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V25.02.08",
"product": {
"name": "SIMATIC IPC847E",
"product_id": "14"
}
}
],
"category": "product_name",
"name": "SIMATIC IPC847E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All BIOS versions \u003c V23.01.08",
"product": {
"name": "SIMATIC ITP1000",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "SIMATIC ITP1000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "All Versions \u003c V08.00.00.00",
"product": {
"name": "SINUMERIK 828D HW PU.4",
"product_id": "16"
}
}
],
"category": "product_name",
"name": "SINUMERIK 828D HW PU.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V05.00.00.00",
"product": {
"name": "SINUMERIK MC MCU 1720",
"product_id": "17"
}
}
],
"category": "product_name",
"name": "SINUMERIK MC MCU 1720"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V08.00.00.00",
"product": {
"name": "SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V04.00.00.00",
"product": {
"name": "SINUMERIK ONE NCU 1740",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "SINUMERIK ONE NCU 1740"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V06.00.00.00",
"product": {
"name": "SINUMERIK ONE PPU 1740",
"product_id": "20"
}
}
],
"category": "product_name",
"name": "SINUMERIK ONE PPU 1740"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0590",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Improper input validation in BIOS firmware for some Intel Processors may\nallow an authenticated user to potentially enable escalation of privilege\nvia local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"4",
"9",
"10",
"11",
"12",
"13",
"14"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run untrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code if possible.",
"product_ids": [
"4",
"9",
"10",
"11",
"12",
"13",
"14"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: \nhttps://www.siemens.com/industrialsecurity",
"product_ids": [
"4",
"9",
"10",
"11",
"12",
"13",
"14"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V26.01.08 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V1.4.0 or later version",
"product_ids": [
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to R1.30.0 or later version",
"product_ids": [
"10"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V25.02.08 or later version",
"product_ids": [
"11",
"12",
"13",
"14"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"4",
"9",
"10",
"11",
"12",
"13",
"14"
]
}
],
"title": "CVE-2020-0590"
},
{
"cve": "CVE-2020-8694",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Insufficient access control in the Linux kernel driver for some\nIntel Processors may allow an authenticated user to potentially enable\ninformation disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"3",
"4",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run untrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code if possible.",
"product_ids": [
"3",
"4",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: \nhttps://www.siemens.com/industrialsecurity",
"product_ids": [
"3",
"4",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V22.01.08 or later version",
"product_ids": [
"3"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V26.01.08 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V21.01.15 or later version",
"product_ids": [
"6",
"7",
"8"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V1.4.0 or later version",
"product_ids": [
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to R1.30.0 or later version",
"product_ids": [
"10"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V25.02.08 or later version",
"product_ids": [
"11",
"12",
"13",
"14"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V23.01.08 or later version",
"product_ids": [
"15"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"3",
"4",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15"
]
}
],
"title": "CVE-2020-8694"
},
{
"cve": "CVE-2020-8698",
"cwe": {
"id": "CWE-1189",
"name": "Improper Isolation of Shared Resources on System-on-a-Chip (SoC)"
},
"notes": [
{
"category": "summary",
"text": "Improper isolation of shared resources in some Intel Processors may allow an\nauthenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"3",
"4",
"6",
"7",
"8",
"11",
"12",
"13",
"14",
"15"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run untrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code if possible.",
"product_ids": [
"3",
"4",
"6",
"7",
"8",
"11",
"12",
"13",
"14",
"15"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: \nhttps://www.siemens.com/industrialsecurity",
"product_ids": [
"3",
"4",
"6",
"7",
"8",
"11",
"12",
"13",
"14",
"15"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V22.01.08 or later version",
"product_ids": [
"3"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V26.01.08 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V21.01.15 or later version",
"product_ids": [
"6",
"7",
"8"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V25.02.08 or later version",
"product_ids": [
"11",
"12",
"13",
"14"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V23.01.08 or later version",
"product_ids": [
"15"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"3",
"4",
"6",
"7",
"8",
"11",
"12",
"13",
"14",
"15"
]
}
],
"title": "CVE-2020-8698"
},
{
"cve": "CVE-2020-8745",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
"remediations": [
{
"category": "mitigation",
"details": "As a prerequisite for an attack, an attacker must be able to run untrusted code on affected systems. Siemens recommends limiting the possibilities to run untrusted code if possible.",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
{
"category": "mitigation",
"details": "Applying a Defense-in-Depth concept can help to reduce the probability that untrusted code is run on the system. Siemens recommends to apply the Defense-in-Depth concept: \nhttps://www.siemens.com/industrialsecurity",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V22.01.08 or later version",
"product_ids": [
"3"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V26.01.08 or later version",
"product_ids": [
"4"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V27.01.05 or later version",
"product_ids": [
"5"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V21.01.15 or later version",
"product_ids": [
"6",
"7",
"8"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V1.4.0 or later version",
"product_ids": [
"9"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V25.02.08 or later version",
"product_ids": [
"11",
"12",
"13",
"14"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V23.01.08 or later version",
"product_ids": [
"15"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109763408"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V0209_0105 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109743969/"
},
{
"category": "vendor_fix",
"details": "Update BIOS to V05.00.00.00 or later version\nSINUMERIK software can be obtained from your local Siemens account manager.",
"product_ids": [
"17"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V08.00.00.00 or later version\nSINUMERIK software can be obtained from your local Siemens account manager.",
"product_ids": [
"16",
"18"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V06.00.00.00 or later version\nSINUMERIK software can be obtained from your local Siemens account manager.",
"product_ids": [
"20"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V05.00.01.00 or later version\nThe update can be obtained from your local Siemens account manager.",
"product_ids": [
"1"
]
},
{
"category": "vendor_fix",
"details": "Update BIOS to V04.00.00.00 or later version\nSINUMERIK software can be obtained from your local Siemens account manager.",
"product_ids": [
"19"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20"
]
}
],
"title": "CVE-2020-8745"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…