Incorrect permission assignment for critical resource in Siemens Products



Published: 2023-04-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-44725
CWE-ID CWE-732
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
SIMATIC NET PC Software
Server applications / SCADA systems

OpenPCS 7
Server applications / SCADA systems

SIMATIC WinCC Runtime Professional
Server applications / SCADA systems

SIMATIC WinCC Unified PC Runtime
Server applications / SCADA systems

Siemens SIMATIC WinCC
Server applications / SCADA systems

TeleControl Server Basic
Client/Desktop applications / Other client software

SIMATIC Process Historian OPC UA Server
Server applications / Other server solutions

Vendor Siemens

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Incorrect permission assignment for critical resource

EUVDB-ID: #VU75039

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-44725

CWE-ID: CWE-732 - Incorrect Permission Assignment for Critical Resource

Exploit availability: No

Description

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to a hard-coded file path to a configuration file. A local user can create a malicious file that is loaded by LDS.

Mitigation

Install update from vendor's website.

Vulnerable software versions

SIMATIC NET PC Software: 14 - 18

OpenPCS 7: 9.1

TeleControl Server Basic: 3

SIMATIC Process Historian OPC UA Server: All versions

SIMATIC WinCC Runtime Professional: All versions

SIMATIC WinCC Unified PC Runtime: before 18.0 UPD 1 SR 1

Siemens SIMATIC WinCC: before 8.0

External links

http://cert-portal.siemens.com/productcert/txt/ssa-691715.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###