Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2020-10049 CVE-2020-10050 CVE-2020-10051 |
CWE-ID | CWE-276 CWE-428 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
SIMATIC RTLS Locating Manager Server applications / SCADA systems |
Vendor | Siemens |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU46518
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-10049
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions for files and folders that are set by the application within the start-stop scripts. A local user can include arbitrary commands that are executed when services are started or stopped interactively by system administrators.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSIMATIC RTLS Locating Manager: before 2.10.2
CPE2.3 External linkshttp://ics-cert.us-cert.gov/advisories/icsa-20-252-01
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU46519
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-10050
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions within the directory of service executables of the affected application. A local user can include arbitrary commands that are executed with SYSTEM privileges when the system restarts.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSIMATIC RTLS Locating Manager: before 2.10.2
CPE2.3 External linkshttp://ics-cert.us-cert.gov/advisories/icsa-20-252-01
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU46520
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-10051
CWE-ID:
CWE-428 - Unquoted Search Path or Element
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the target system.
The vulnerability exists due to an unquoted service executable path in multiple services. A local user can inject arbitrary commands that are executed instead of the legitimate service.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSIMATIC RTLS Locating Manager: before 2.10.2
CPE2.3 External linkshttp://ics-cert.us-cert.gov/advisories/icsa-20-252-01
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?