CVE-2020-7581
14.07.2020, 14:15
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. This could allow a local attacker with administrative privileges to execute code with SYSTEM level privileges.Enginsight
Vendor | Product | Version |
---|---|---|
siemens | opcenter_execution_discrete | 𝑥 < 3.2 |
siemens | opcenter_execution_foundation | 𝑥 < 3.2 |
siemens | opcenter_execution_process | 𝑥 < 3.2 |
siemens | opcenter_intelligence | * |
siemens | opcenter_quality | 𝑥 < 11.3 |
siemens | opcenter_rd\&l | 8.0 |
siemens | simatic_notifier_server | * |
siemens | simatic_pcs_neo | * |
siemens | simatic_step_7 | 𝑥 < 16 |
siemens | simocode_es | * |
siemens | soft_starter_es | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration