A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. This could allow a local attacker with administrative privileges to execute code with SYSTEM level privileges.
2020-07-14T14:15:18.587
2024-11-21T05:37:24.977
Modified
CVSSv3.1: 6.7 (MEDIUM)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | siemens | opcenter_execution_discrete | < 3.2 | Yes |
Application | siemens | opcenter_execution_foundation | < 3.2 | Yes |
Application | siemens | opcenter_execution_process | < 3.2 | Yes |
Application | siemens | opcenter_intelligence | * | Yes |
Application | siemens | opcenter_quality | < 11.3 | Yes |
Application | siemens | opcenter_rd\&l | 8.0 | Yes |
Application | siemens | simatic_notifier_server | * | Yes |
Application | siemens | simatic_pcs_neo | * | Yes |
Application | siemens | simatic_step_7 | < 16 | Yes |
Application | siemens | simatic_step_7 | 16 | Yes |
Application | siemens | simatic_step_7 | 16 | Yes |
Application | siemens | simocode_es | * | Yes |
Application | siemens | soft_starter_es | * | Yes |