Our colleague Ander Martinez reported through INCIBE-CERT a privilege escalation vulnerability that affects a wide range of Siemens software, including:
> SIMATIC Automation Tool
> SIMATIC NET PC software
> SIMATIC PCS 7
> SIMATIC ProSave
> SIMATIC S7-1500 Software Controller
> SIMATIC STEP 7 (TIA Portal)
> SIMATIC WinCC OA
> SIMATIC WinCC Runtime Advanced
> SIMATIC WinCC Runtime Professional V14
> SINAMICS STARTER commissioning tool
> SINEC NMS
> SINEMA Server
> SINUMERIK
The vulnerability is SSA-312271: UnquotedSearchPathVulnerabilitiesinWindows-basedIndustrialSoftwareApplication
Thank INCIBE-CERT for their collaboration in coordinating the disclosure of this vulnerability.
More details in the URL:
https://cert-portal.siemens.com/productcert/pdf/ssa-312271.pdf
Some of the workarounds proposed by the manufacturer are:
• Make sure that there is no executable at the following locations:
–C: \ Program.exe,
–C: \ Program Files \ Common.exe, or
– C: \ Program Files \ Common Files \ Siemens \ Automation \ Simatic.exe
• Deactivate the Windows service called TraceConceptX. This leads to loss of tracing functionalityand should only be considered as a temporary workaround.
No hay comentarios:
Publicar un comentario