THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2023-25910

Assignersiemens
Reserved2023-02-16
Published2023-06-13
Updated2024-05-15

Description

A vulnerability has been identified in SIMATIC PCS 7 (All versions < V9.1 SP2 UC04), SIMATIC S7-PM (All versions < V5.7 SP1 HF1), SIMATIC S7-PM (All versions < V5.7 SP2 HF1), SIMATIC STEP 7 V5 (All versions < V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server. An attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system's server.



CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:T/RC:C

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unknown

Any version before V9.1 SP2 UC04
affected

Default status
unknown

Any version before V5.7 SP1 HF1
affected

Default status
unknown

Any version before V5.7 SP2 HF1
affected

Default status
unknown

Any version before V5.7
affected

References

https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf

https://cert-portal.siemens.com/productcert/html/ssa-968170.html

cve.org CVE-2023-25910

nvd.nist.gov CVE-2023-25910

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-25910
© Copyright 2024 THREATINT. Made in Cyprus with +