As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
1. EXECUTIVE SUMMARY
- CVSS v4 9.3
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Siemens
- Equipment: User Management Component (UMC)
- Vulnerability: Heap-based Buffer Overflow
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker arbitrary code execution.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports the following products are affected:
- Opcenter Execution Foundation: All versions
- Opcenter Intelligence: All versions
- Opcenter Quality: All versions
- Opcenter RDL: All versions
- SIMATIC PCS neo V4.0: All versions
- SIMATIC PCS neo V4.1: All versions
- SIMATIC PCS neo V5.0: All versions prior to V5.0 Update 1
- SINEC NMS: All versions
- Totally Integrated Automation Portal (TIA Portal) V16: All versions
- Totally Integrated Automation Portal (TIA Portal) V17: All versions
- Totally Integrated Automation Portal (TIA Portal) V18: All versions
- Totally Integrated Automation Portal (TIA Portal) V19: All versions
3.2 Vulnerability Overview
3.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122
Affected products contain a heap-based buffer overflow vulnerability in the integrated UMC component. This could allow an unauthenticated remote attacker to execute arbitrary code.
This article has been indexed from All CISA Advisories
Read the original article: