Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2023-33919 CVE-2023-33920 CVE-2023-33921 |
CWE-ID | CWE-77 CWE-798 CWE-749 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
CP-8031 MASTER MODULE Hardware solutions / Firmware CP-8050 MASTER MODULE Hardware solutions / Firmware |
Vendor | Siemens |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU77346
Risk: Low
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-33919
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary commands on the target system.
The vulnerability exists due to improper input validation. A remote administrator can pass specially crafted data to the application and execute arbitrary commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCP-8031 MASTER MODULE: before CPCI85 V05
CP-8050 MASTER MODULE: before CPCI85 V05
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-731916.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77353
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-33920
CWE-ID:
CWE-798 - Use of Hard-coded Credentials
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain full access to vulnerable system.
The vulnerability exists due to presence of hard-coded credentials in application code. An attacker with physical access can access the affected system using the hard-coded credentials.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCP-8031 MASTER MODULE: before CPCI85 V05
CP-8050 MASTER MODULE: before CPCI85 V05
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-731916.pdf
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77355
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-33921
CWE-ID:
CWE-749 - Exposed Dangerous Method or Function
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to the affected devices contain an exposed UART console login interface. An attacker with physical access can brute-force or crack the root password to login to the device.
MitigationInstall updates from vendor's website.
Vulnerable software versionsCP-8031 MASTER MODULE: before CPCI85 V05
CP-8050 MASTER MODULE: before CPCI85 V05
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-731916.pdf
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.