CVE-2023-32735

July 9, 2024, 6:19 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

SIMATIC STEP 7 Safety V16

  • All versions < V16 Update 7

SIMATIC STEP 7 Safety V17

  • All versions < V17 Update 7

SIMATIC STEP 7 Safety V18

  • All versions < V18 Update 2

SIMATIC STEP 7 V16

  • All versions < V16 Update 7

SIMATIC STEP 7 V17

  • All versions < V17 Update 7

SIMATIC STEP 7 V18

  • All versions < V18 Update 2

SIMATIC WinCC Unified V16

  • All versions < V16 Update 7

SIMATIC WinCC Unified V17

  • All versions < V17 Update 7

SIMATIC WinCC Unified V18

  • All versions < V18 Update 2

SIMATIC WinCC V16

  • All versions < V16.7

SIMATIC WinCC V17

  • All versions < V17.7

SIMATIC WinCC V18

  • All versions < V18 Update 2

SIMOCODE ES V16

  • All versions < V16 Update 7

SIMOCODE ES V17

  • All versions < V17 Update 7

SIMOCODE ES V18

  • All versions < V18 Update 2

SIMOTION SCOUT TIA V5.4 SP1

  • All versions

SIMOTION SCOUT TIA V5.4 SP3

  • All versions

SIMOTION SCOUT TIA V5.5 SP1

  • All versions

SINAMICS Startdrive V16

  • All versions

SINAMICS Startdrive V17

  • All versions

SINAMICS Startdrive V18

  • All versions

SIRIUS Safety ES V17

  • All versions < V17 Update 7

SIRIUS Safety ES V18

  • All versions < V18 Update 2

SIRIUS Soft Starter ES V17

  • All versions < V17 Update 7

SIRIUS Soft Starter ES V18

  • All versions < V18 Update 2

Soft Starter ES V16

  • All versions < V16 Update 7

TIA Portal Cloud V3.0

  • All versions < V18 Update 2

Source

productcert@siemens.com

Tags

CVE-2023-32735 details

Published : July 9, 2024, 12:15 p.m.
Last Modified : July 9, 2024, 6:19 p.m.

Description

A vulnerability has been identified in SIMATIC STEP 7 Safety V16 (All versions < V16 Update 7), SIMATIC STEP 7 Safety V17 (All versions < V17 Update 7), SIMATIC STEP 7 Safety V18 (All versions < V18 Update 2), SIMATIC STEP 7 V16 (All versions < V16 Update 7), SIMATIC STEP 7 V17 (All versions < V17 Update 7), SIMATIC STEP 7 V18 (All versions < V18 Update 2), SIMATIC WinCC Unified V16 (All versions < V16 Update 7), SIMATIC WinCC Unified V17 (All versions < V17 Update 7), SIMATIC WinCC Unified V18 (All versions < V18 Update 2), SIMATIC WinCC V16 (All versions < V16.7), SIMATIC WinCC V17 (All versions < V17.7), SIMATIC WinCC V18 (All versions < V18 Update 2), SIMOCODE ES V16 (All versions < V16 Update 7), SIMOCODE ES V17 (All versions < V17 Update 7), SIMOCODE ES V18 (All versions < V18 Update 2), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SIRIUS Safety ES V17 (All versions < V17 Update 7), SIRIUS Safety ES V18 (All versions < V18 Update 2), SIRIUS Soft Starter ES V17 (All versions < V17 Update 7), SIRIUS Soft Starter ES V18 (All versions < V18 Update 2), Soft Starter ES V16 (All versions < V16 Update 7), TIA Portal Cloud V3.0 (All versions < V18 Update 2). Affected applications do not properly restrict the .NET BinaryFormatter when deserializing hardware configuration profiles. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300.

CVSS Score

1 2 3 4 5 6.5 7 8 9 10

Weakness

Weakness Name Description
CWE-502 Deserialization of Untrusted Data The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

CVSS Data

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score

6.5

Exploitability Score

0.6

Impact Score

5.9

Base Severity

MEDIUM

References

URL Source
https://cert-portal.siemens.com/productcert/html/ssa-779936.html productcert@siemens.com
This website uses the NVD API, but is not approved or certified by it.