Input validation error in Siemens products - CVE-2021-41769

 

Input validation error in Siemens products - CVE-2021-41769

Published: January 18, 2022


Vulnerability identifier: #VU59673
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-41769
CWE-ID: CWE-20
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
SIPROTEC 5 6MD85 devices (CPU variant CP300)
SIPROTEC 5 6MD89 devices (CPU variant CP300)
SIPROTEC 5 6MU85 devices (CPU variant CP300)
SIPROTEC 5 7KE85 devices (CPU variant CP300)
SIPROTEC 5 7SA82 devices (CPU variant CP100)
SIPROTEC 5 7SA86 devices (CPU variant CP300)
SIPROTEC 5 7SA87 devices (CPU variant CP300)
SIPROTEC 5 7SD82 devices (CPU variant CP100)
SIPROTEC 5 7SD86 devices (CPU variant CP300)
SIPROTEC 5 7SD87 devices (CPU variant CP300)
SIPROTEC 5 7SJ81 devices (CPU variant CP100)
SIPROTEC 5 7SJ82 devices (CPU variant CP100)
SIPROTEC 5 7SJ85 devices (CPU variant CP300)
SIPROTEC 5 7SJ86 devices (CPU variant CP300)
SIPROTEC 5 7SK82 devices (CPU variant CP100)
SIPROTEC 5 7SK85 devices (CPU variant CP300)
SIPROTEC 5 7SL82 devices (CPU variant CP100)
SIPROTEC 5 7SL86 devices (CPU variant CP300)
SIPROTEC 5 7SL87 devices (CPU variant CP300)
SIPROTEC 5 7SS85 devices (CPU variant CP300)
SIPROTEC 5 7ST85 devices (CPU variant CP300)
SIPROTEC 5 7SX85 devices (CPU variant CP300)
SIPROTEC 5 7UM85 devices (CPU variant CP300)
SIPROTEC 5 7UT82 devices (CPU variant CP100)
SIPROTEC 5 7UT85 devices (CPU variant CP300)
SIPROTEC 5 7UT86 devices (CPU variant CP300)
SIPROTEC 5 7UT87 devices (CPU variant CP300)
SIPROTEC 5 7VE85 devices (CPU variant CP300)
SIPROTEC 5 7VK87 devices (CPU variant CP300)
SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050)
Software vendor:
Siemens

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input in the web server. A remote attacker on the local network can pass specially crafted input to the application and gain unauthorized access to sensitive information on the system.


Remediation

Install updates from vendor's website.

External links