Page 3 of 48 results (0.005 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). The PUD Manager of affected products does not properly authenticate users in the PUD Manager web service. This could allow an unauthenticated adjacent attacker to generate a privileged token and upload additional documents. Se ha identificado una vulnerabilidad en SIMATIC PCS neo (todas las versiones &lt; V4.1). El PUD Manager de los productos afectados no autentica adecuadamente a los usuarios en el servicio web PUD Manager. • https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf • CWE-306: Missing Authentication for Critical Function •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems. Se ha identificado una vulnerabilidad en SIMATIC PCS neo (Consola de administración) V4.0 (todas las versiones), SIMATIC PCS neo (Consola de administración) V4.0 Update 1 (todas las versiones). La aplicación afectada pierde las credenciales de administrador de Windows. • https://cert-portal.siemens.com/productcert/pdf/ssa-646240.pdf • CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 8.8EPSS: 0%CPEs: 7EXPL: 0

A vulnerability has been identified in SIMATIC NET PC Software V14 (All versions), SIMATIC NET PC Software V15 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC (All versions < V8.0), SINAUT Software ST7sc (All versions). Before SIMATIC WinCC V8, legacy OPC services (OPC DA (Data Access), OPC HDA (Historical Data Access), and OPC AE (Alarms & Events)) were used per default. These services were designed on top of the Windows ActiveX and DCOM mechanisms and do not implement state-of-the-art security mechanisms for authentication and encryption of contents. • https://cert-portal.siemens.com/productcert/pdf/ssa-508677.pdf • CWE-477: Use of Obsolete Function •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

A vulnerability has been identified in SIMATIC PCS 7 (All versions < V9.1 SP2 UC04), SIMATIC S7-PM (All versions < V5.7 SP1 HF1), SIMATIC S7-PM (All versions < V5.7 SP2 HF1), SIMATIC STEP 7 V5 (All versions < V5.7). The affected product contains a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server. An attacker with network access to the server network could leverage these embedded functions to run code with elevated privileges in the database management system's server. Se ha identificado una vulnerabilidad en SIMATIC PCS 7 (todas las versiones &lt; V9.1 SP2 UC04), SIMATIC S7-PM (todas las versiones), SIMATIC STEP 7 V5 (todas las versiones &lt; V5.7). El producto afectado contiene un sistema de gestión de bases de datos que podría permitir a usuarios remotos con pocos privilegios utilizar funciones integradas de la base de datos (local o en un recurso compartido de red) que tienen impacto en el servidor. Un atacante con acceso a la red del servidor podría aprovechar estas funciones integradas para ejecutar código con privilegios elevados en el servidor del sistema de administración de bases de datos. • https://cert-portal.siemens.com/productcert/html/ssa-968170.html https://cert-portal.siemens.com/productcert/pdf/ssa-968170.pdf • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.5EPSS: 0%CPEs: 223EXPL: 0

The login endpoint /FormLogin in affected web services does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack. El endpoint de inicio de sesión /FormLogin en los servicios web afectados no aplica la verificación de origen adecuada. Esto podría permitir a atacantes remotos autenticados rastrear las actividades de otros usuarios mediante un ataque de Cross-Site Request Forgery (CSRF). • https://cert-portal.siemens.com/productcert/pdf/ssa-478960.pdf • CWE-352: Cross-Site Request Forgery (CSRF) •