Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-26293 |
CWE-ID | CWE-73 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
TIA Portal Server applications / SCADA systems |
Vendor | Siemens |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU74816
Risk: High
CVSSv3.1: 7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-26293
CWE-ID:
CWE-73 - External Control of File Name or Path
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to create or overwrite arbitrary files.
The vulnerability exists due to improper input validation of path names inside PC system configuration files. A remote attacker can trick the victim to open a specially crafted PC system configuration file and create or overwrite arbitrary files on the system.
Install updates from vendor's website.
Vulnerable software versionsTIA Portal: 15 - 18
External linkshttp://cert-portal.siemens.com/productcert/txt/ssa-116924.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.