As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
1. EXECUTIVE SUMMARY
- CVSS v3 7.5
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Siemens
- Equipment: User Management Component (UMC)
- Vulnerabilities: Permissive Cross-domain Policy with Untrusted Domains, Cross-site Scripting, Classic Buffer Overflow, Improper Input Validation
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could lead to a restart of the UMC server.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports the following products are affected:
- Opcenter Quality: all versions
- SIMATIC PCS neo: versions prior to v4.1
- SINUMERIK Integrate RunMyHMI /Automotive: all versions
- Totally Integrated Automation Portal (TIA Portal) v14: all versions
- Totally Integrated Automation Portal (TIA Portal) v15.1: all versions
- Totally Integrated Automation Portal (TIA Portal) v16: all versions
- Totally Integrated Automation Portal (TIA Portal) v17: all versions
- Totally Integrated Automation Portal (TIA Portal) v18: versions prior to V18 update 3
3.2 Vulnerability Overview
3.2.1 PERMISSIVE CROSS-DOMAIN POLICY WITH UNTRUSTED DOMAINS CWE-942
When accessing the UMC Web-UI from affected products, UMC uses an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.
CVE-2023-46281 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; t
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: