Lucene search

K
cveSiemensCVE-2020-7586
HistoryJun 10, 2020 - 5:15 p.m.

CVE-2020-7586

2020-06-1017:15:12
CWE-787
CWE-122
siemens
web.nvd.nist.gov
33
4
vulnerability
buffer overflow
simatic pcs 7
simatic pdm
simatic step 7
sinamics starter
local access
dos
nvd

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

20.7%

A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC PDM (All versions < V9.2), SIMATIC STEP 7 V5.X (All versions < V5.6 SP2 HF3), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 HF2). A buffer overflow vulnerability could allow a local attacker to cause a Denial-of-Service situation. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise the availability of the system as well as to have access to confidential information.

Affected configurations

Nvd
Node
siemenssimatic_pcs_7
OR
siemenssimatic_process_device_manager
OR
siemenssimatic_step_7Range<5.6
OR
siemenssimatic_step_7Match5.6-
OR
siemenssimatic_step_7Match5.6sp1
OR
siemenssimatic_step_7Match5.6sp2
OR
siemenssimatic_step_7Match5.6sp2_hotfix1
OR
siemenssinamics_starterRange<5.4
OR
siemenssinamics_starterMatch5.4-
VendorProductVersionCPE
siemenssimatic_pcs_7*cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*
siemenssimatic_process_device_manager*cpe:2.3:a:siemens:simatic_process_device_manager:*:*:*:*:*:*:*:*
siemenssimatic_step_7*cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*
siemenssimatic_step_75.6cpe:2.3:a:siemens:simatic_step_7:5.6:-:*:*:*:*:*:*
siemenssimatic_step_75.6cpe:2.3:a:siemens:simatic_step_7:5.6:sp1:*:*:*:*:*:*
siemenssimatic_step_75.6cpe:2.3:a:siemens:simatic_step_7:5.6:sp2:*:*:*:*:*:*
siemenssimatic_step_75.6cpe:2.3:a:siemens:simatic_step_7:5.6:sp2_hotfix1:*:*:*:*:*:*
siemenssinamics_starter*cpe:2.3:a:siemens:sinamics_starter:*:*:*:*:*:*:*:*
siemenssinamics_starter5.4cpe:2.3:a:siemens:sinamics_starter:5.4:-:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "SIMATIC PCS 7 V8.2 and earlier",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions"
      }
    ]
  },
  {
    "product": "SIMATIC PCS 7 V9.0",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V9.0 SP3"
      }
    ]
  },
  {
    "product": "SIMATIC PDM",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V9.2"
      }
    ]
  },
  {
    "product": "SIMATIC STEP 7 V5.X",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V5.6 SP2 HF3"
      }
    ]
  },
  {
    "product": "SINAMICS STARTER (containing STEP 7 OEM version)",
    "vendor": "Siemens",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V5.4 HF2"
      }
    ]
  }
]

Social References

More

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

20.7%

Related for CVE-2020-7586