// For flags

CVE-2019-10925

 

Severity Score

7.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). An authenticated attacker could escalate privileges by sending specially crafted requests to the integrated webserver. The security vulnerability can be exploited by an attacker with network access to the device. Valid user credentials, but no user interaction are required. Successful exploitation compromises integrity and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.

Una vulnerabilidad ha sido identificada en la familia SIMATIC MV400 family (Todas las versiones anteriores a V7.0.6). Un atacante identificado podría escalar sus privilegios mediante el envío de peticiones especialmente creadas al servidor web integrado. La vulnerabilidad de la seguridad puede ser aprovechada por un atacante con acceso de red al dispositivo. Credenciales de usuario válidas, pero no se requiere la interacción del usuario. La operación con éxito compromete la integridad y la disponibilidad del dispositivo. En el momento de la publicación de asesoramiento, no se conocía la explotación pública de esta vulnerabilidad de seguridad

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-04-08 CVE Reserved
  • 2019-06-12 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Simatic Mv420 Firmware
Search vendor "Siemens" for product "Simatic Mv420 Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Simatic Mv420
Search vendor "Siemens" for product "Simatic Mv420"
--
Safe
Siemens
Search vendor "Siemens"
Simatic Mv440 Firmware
Search vendor "Siemens" for product "Simatic Mv440 Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Simatic Mv440
Search vendor "Siemens" for product "Simatic Mv440"
--
Safe