Vulnerability identifier: #VU29944
Vulnerability risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-428
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Opcenter Execution Discrete
Server applications /
SCADA systems
Opcenter Execution Foundation
Server applications /
SCADA systems
Opcenter Execution Process
Server applications /
SCADA systems
Opcenter Intelligence
Server applications /
SCADA systems
Opcenter Quality
Server applications /
SCADA systems
Opcenter RD&L
Server applications /
SCADA systems
SIMATIC IT LMS
Server applications /
SCADA systems
SIMATIC IT Production Suite
Server applications /
SCADA systems
SIMATIC Notifier Server for Windows
Server applications /
SCADA systems
SIMATIC STEP 7 (TIA Portal)
Server applications /
SCADA systems
SIMOCODE ES
Server applications /
SCADA systems
SIMATIC PCS neo
Web applications /
Other software
Soft Starter ES
Other software /
Other software solutions
Vendor: Siemens
Description
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exist due to a component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. A local administrator can execute arbitrary code with SYSTEM level privileges.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Opcenter Execution Discrete: All versions
Opcenter Execution Foundation: All versions
Opcenter Execution Process: All versions
Opcenter Intelligence: All versions
Opcenter Quality: All versions
Opcenter RD&L: 8.0
SIMATIC IT LMS: All versions
SIMATIC IT Production Suite: All versions
SIMATIC Notifier Server for Windows: All versions
SIMATIC PCS neo: All versions
SIMATIC STEP 7 (TIA Portal): 15.0 - 16.0
SIMOCODE ES: All versions
Soft Starter ES: All versions
External links
http://cert-portal.siemens.com/productcert/pdf/ssa-841348.pdf
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.