Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2019-10943 CVE-2019-10929 |
CWE-ID | CWE-284 CWE-300 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
SIMATIC S7-PLCSIM Advanced Server applications / SCADA systems SIMATIC S7-1500 Software Controller Server applications / SCADA systems SIMATIC ET 200SP Open Controller Server applications / SCADA systems SIMATIC S7-1500 CPU Hardware solutions / Firmware SIMATIC S7-1200 Hardware solutions / Firmware |
Vendor | Siemens |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU21970
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2019-10943
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker with network access to port 102/tcp can modify the user program stored on the affected devices such that the source code differs from the actual running code and gain unauthorized access to the application.
This vulnerability affects the following products:
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsSIMATIC S7-PLCSIM Advanced: All versions
SIMATIC S7-1500 Software Controller: All versions
SIMATIC S7-1500 CPU: All versions
SIMATIC S7-1200: 2.00 - 4.0
SIMATIC ET 200SP Open Controller: All versions
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU21969
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-10929
CWE-ID:
CWE-300 - Channel Accessible by Non-Endpoint ('Man-in-the-Middle')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform man-in-the-middle (MitM) attack.
The vulnerability exists due to certain properties in the calculation used for integrity protection. A remote attacker in a Man-in-the-Middle position can modify network traffic exchanged on 102/tcp port.
This vulnerability affects the following products:
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsSIMATIC S7-PLCSIM Advanced: All versions
SIMATIC S7-1500 Software Controller: All versions
SIMATIC S7-1500 CPU: All versions
SIMATIC S7-1200: 2.00 - 4.0
SIMATIC ET 200SP Open Controller: All versions
CPE2.3https://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.