viernes, 26 de junio de 2020

New Siemens vulnerability disclosed:SSA-312271: UnquotedSearchPathVulnerabilitiesinWindows-basedIndustrialSoftwareApplication

Our colleague Ander Martinez reported through INCIBE-CERT a privilege escalation vulnerability that affects a wide range of Siemens software, including: 

> SIMATIC Automation Tool 
> SIMATIC NET PC software 
> SIMATIC PCS 7 
> SIMATIC ProSave 
> SIMATIC S7-1500 Software Controller
> SIMATIC STEP 7 (TIA Portal) 
> SIMATIC WinCC OA 
> SIMATIC WinCC Runtime Advanced 
> SIMATIC WinCC Runtime Professional V14 
> SINAMICS STARTER commissioning tool 
> SINEC NMS 
> SINEMA Server 
> SINUMERIK 

The vulnerability is SSA-312271: UnquotedSearchPathVulnerabilitiesinWindows-basedIndustrialSoftwareApplication 
Thank INCIBE-CERT for their collaboration in coordinating the disclosure of this vulnerability. 
More details in the URL: https://cert-portal.siemens.com/productcert/pdf/ssa-312271.pdf 

Some of the workarounds proposed by the manufacturer are: 
• Make sure that there is no executable at the following locations: 
–C: \ Program.exe, 
–C: \ Program Files \ Common.exe, or 
– C: \ Program Files \ Common Files \ Siemens \ Automation \ Simatic.exe 
• Deactivate the Windows service called TraceConceptX. This leads to loss of tracing functionalityand should only be considered as a temporary workaround.

No hay comentarios:

Publicar un comentario