We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)
Ok

THREATINT
PUBLISHED

CVE-2023-46281

Reserved:2023-10-20
Published:2023-12-12
Updated:2024-05-15

Description

A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 7), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). When accessing the UMC Web-UI from affected products, UMC uses an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.



HIGH: 7.1CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C

Problem types

CWE-942: Permissive Cross-domain Policy with Untrusted Domains

Product status

Default status
unknown

Any version before V2312
affected

Default status
unknown

Any version before V4.1
affected

Default status
unknown

Any version before V2.0 SP1
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V17 Update 7
affected

Default status
unknown

Any version before V18 Update 3
affected

References

https://cert-portal.siemens.com/productcert/pdf/ssa-999588.pdf

https://cert-portal.siemens.com/productcert/html/ssa-999588.html

cve.org CVE-2023-46281

nvd.nist.gov CVE-2023-46281

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-46281