Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-38465 |
CWE-ID | CWE-522 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
SIMATIC ET 200SP Open Controller CPU 1515SP PC Hardware solutions / Other hardware appliances SIMATIC Drive Controller Hardware solutions / Firmware SIMATIC S7-1200 CPU family Hardware solutions / Firmware SIMATIC S7-1500 CPU Hardware solutions / Firmware SIMATIC ET 200SP Open Controller CPU 1515SP PC2 Server applications / SCADA systems SIMATIC S7-1500 Software Controller Server applications / SCADA systems SIMATIC S7-PLCSIM Advanced Server applications / SCADA systems |
Vendor | Siemens |
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU68263
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-38465
CWE-ID:
CWE-522 - Insufficiently Protected Credentials
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to insufficiently protected credentials. A local attacker can discover the private key of a CPU product family and extract confidential configuration data from projects that are protected by that key or perform attacks against legacy PG/PC and HMI communication.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSIMATIC ET 200SP Open Controller CPU 1515SP PC: All versions
SIMATIC Drive Controller: before 2.9.2
SIMATIC ET 200SP Open Controller CPU 1515SP PC2: before 21.9
SIMATIC S7-1200 CPU family: before 4.5.0
SIMATIC S7-1500 CPU: before 2.9.2
SIMATIC S7-1500 Software Controller: before 21.9
SIMATIC S7-PLCSIM Advanced: before 4.0
http://cert-portal.siemens.com/productcert/pdf/ssa-568427.pdf
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?