Siemens User Management Component (UMC)

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v3 7.5
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Siemens
  • Equipment: User Management Component (UMC)
  • Vulnerabilities: Permissive Cross-domain Policy with Untrusted Domains, Cross-site Scripting, Classic Buffer Overflow, Improper Input Validation

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could lead to a restart of the UMC server.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Siemens reports the following products are affected:

  • Opcenter Quality: all versions
  • SIMATIC PCS neo: versions prior to v4.1
  • SINUMERIK Integrate RunMyHMI /Automotive: all versions
  • Totally Integrated Automation Portal (TIA Portal) v14: all versions
  • Totally Integrated Automation Portal (TIA Portal) v15.1: all versions
  • Totally Integrated Automation Portal (TIA Portal) v16: all versions
  • Totally Integrated Automation Portal (TIA Portal) v17: all versions
  • Totally Integrated Automation Portal (TIA Portal) v18: versions prior to V18 update 3

3.2 Vulnerability Overview

3.2.1 PERMISSIVE CROSS-DOMAIN POLICY WITH UNTRUSTED DOMAINS CWE-942

When accessing the UMC Web-UI from affected products, UMC uses an overly permissive CORS policy. This could allow an attacker to trick a legitimate user to trigger unwanted behavior.

CVE-2023-46281 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; t

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: