We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-46281



Description

A vulnerability has been identified in Opcenter Execution Foundation (All versions < V2407), Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 8), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). When accessing the UMC Web-UI from affected products, UMC uses an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.

Reserved 2023-10-20 | Published 2023-12-12 | Updated 2024-10-08 | Assigner siemens


HIGH: 7.1CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C

Problem types

CWE-942: Permissive Cross-domain Policy with Untrusted Domains

Product status

Default status
unknown

Any version before V2407
affected

Default status
unknown

Any version before V2312
affected

Default status
unknown

Any version before V4.1
affected

Default status
unknown

Any version before V2.0 SP1
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V17 Update 8
affected

Default status
unknown

Any version before V18 Update 3
affected

References

cert-portal.siemens.com/productcert/pdf/ssa-999588.pdf

cert-portal.siemens.com/productcert/html/ssa-999588.html

cve.org (CVE-2023-46281)

nvd.nist.gov (CVE-2023-46281)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-46281

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.